Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part3-3P Exam Dumps - CIA Exam Part Three: Business Knowledge for Internal Auditing

Question # 4

Which of the following devices best controls both physical and logical access to information systems?

A.

Plenum.

B.

Biometric lock.

C.

Identification card.

D.

Electromechanical lock.

Full Access
Question # 5

A manager decided to build his team's enthusiasm by giving encouraging talks about employee empowerment, hoping to change the perception that management should make all decisions in the department.

The manager is most likely trying to impact which of the following components of his team's attitude?

A.

Affective component.

B.

Cognition component.

C.

Thinking component.

D.

Behavioral component.

Full Access
Question # 6

Which of the following is the first step an internal audit activity should undertake when executing a data analytics process?

A.

Conduct a risk assessment regarding the effectiveness of the data analytics process.

B.

Analyze possible and available sources of raw data

C.

Define the purpose and the anticipated value

D.

Select data for cleaning and normalization procedures.

Full Access
Question # 7

Which of the following IT controls includes protection for mainframe computers and workstations?

A.

Change management controls

B.

Physical and environmental controls.

C.

System software controls

D.

Organization and management controls

Full Access
Question # 8

A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager.

Which of the following organizational structures does this situation represent?

A.

Functional departmentalization.

B.

Product departmentalization.

C.

Matrix organization.

D.

Divisional organization.

Full Access
Question # 9

Which of the following statements is true regarding the "management-by-objectives" method?

A.

Management by objectives is most helpful in organizations that nave rapid changes.

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.

Management by objectives helps organizations to keep employees motivated.

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals

Full Access
Question # 10

According to MA guidance, which of the following would indicate poor change management control?

1) Low change success rate

2) Occasional planned outages

3) Low number of emergency changes.

4) Instances of unauthorized changes

A.

1 and 3

B.

1 and 4

C.

2 and 3

D.

2 and 4

Full Access
Question # 11

Which of the following statements is true regarding change management?

A.

The degree of risk associated with a proposed change determines whether the change request requires authorization.

B.

Program changes generally are developed and tested in the production environment.

C.

Changes are only required by software programs.

D.

To protect the production environment, changes must be managed in a repeatable, defined, and predictable manner.

Full Access
Question # 12

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

A.

An extranet

B.

A local area network.

C.

An intranet

D.

The internet

Full Access
Question # 13

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

A.

Direct product costs

B.

Indirect product costs

C.

Direct period costs

D.

Indirect period costs.

Full Access
Question # 14

An organization accumulated the following data for the prior fiscal year:

Value of Percentage of

Quarter

Output Produced

Cost X

1

$4,750,000

2.9

2

$4,700,000

3.0

3

$4,350,000

3.2

4

$4,000,000

3.5

Based on this data, which of the following describes the value of Cost X in relation to the value of Output Produced?

A.

Cost X is a variable cost.

B.

Cost X is a fixed cost.

C.

Cost X is a semi-fixed cost.

D.

Cost X and the value of Output Produced are unrelated.

Full Access
Question # 15

Refer to the exhibit.

If the profit margin of an organization decreases, and all else remains equal, which of the following describes

how the "Funds Needed" line in the graph below will shift?

A.

The "Funds Needed" line will remain pointed upward, but will become less steep.

B.

The "Funds Needed" line will remain pointed upward, but will become more steep.

C.

The "Funds Needed" line will point downward with a minimal slope.

D.

The "Funds Needed" line will point downward with an extreme slope.

Full Access
Question # 16

Which of the following strategies is most appropriate for an industry that is in decline?

A.

Invest in marketing.

B.

Invest in research and development.

C.

Control costs.

D.

Shift toward mass production.

Full Access
Question # 17

According to the Standards, the internal audit activity must evaluate risk exposures relating to which of the following when examining an organization's risk management process?

1) Organizational governance.

2) Organizational operations.

3) Organizational information systems.

4) Organizational structure.

A.

1 and 3 only

B.

2 and 4 only

C.

1, 2, and 3 only

D.

1, 2, and 4 only

Full Access
Question # 18

Which of the following is not a method for implementing a new application system?

A.

Direct cutover.

B.

Parallel.

C.

Pilot.

D.

Test.

Full Access
Question # 19

When developing an effective risk-based plan to determine audit priorities, an internal audit activity should start by:

A.

Identifying risks to the organization's operations.

B.

Observing and analyzing controls.

C.

Prioritizing known risks.

D.

Reviewing organizational objectives.

Full Access
Question # 20

Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?

A.

Both the key used to encrypt the data and the key used to decrypt the data are made public.

B.

The key used to encrypt the data is kept private but the key used to decrypt the data is made public.

C.

The key used to encrypt the data is made public but the key used to decrypt the data is kept private.

D.

Both the key used to encrypt the data and the key used to decrypt the data are made private.

Full Access
Question # 21

In mergers and acquisitions, which of the following is an example of a horizontal combination?

A.

Dairy manufacturing company taking over a large dairy farm.

B.

A movie producer acquires movie theaters.

C.

A petroleum processing company acquires an agro-processing firm.

D.

A baker taking over a competitor.

Full Access
Question # 22

Which of the following statements about slack time and milestones are true?

1) Slack time represents the amount of time a task may be delayed without delaying the entire project.

2) A milestone is a moment in time that marks the completion of the project's major deliverables.

3) Slack time allows the project manager to move resources from one task to another to ensure that the project is finished on time.

4) A milestone requires resource allocation and needs time to be completed.

A.

1 and 4 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, 3, and 4

Full Access
Question # 23

Capacity overbuilding is most likely to occur when management is focused on which of the following?

A.

Marketing.

B.

Finance.

C.

Production.

D.

Diversification.

Full Access
Question # 24

When initiating international ventures, an organization should consider cultural dimensions in order to prevent misunderstandings. Which of the following does not represent a recognized cultural dimension in a work environment?

A.

Self control.

B.

Power distance.

C.

Masculinity versus femininity.

D.

Uncertainty avoidance.

Full Access
Question # 25

Which of the following are typical responsibilities for operational management within a risk management program?

1) Implementing corrective actions to address process deficiencies.

2) Identifying shifts in the organization's risk management environment.

3)( Providing guidance and training on risk management processes.

4) Assessing the impact of mitigation strategies and activities.

A.

1 and 2 only

B.

1 and 4 only

C.

2 and 3 only

D.

3 and 4 only

Full Access
Question # 26

While auditing an organization's customer call center, an internal auditor notices that key performance indicators show a positive trend despite the fact that there have been increasing customer complaints over the same period Which of the following audit recommendations would most likely correct the cause of this inconsistency?

A.

Review the the call center script used by customer service agents to interact with callers and update the script rf necessary

B.

De-emphasize the importance of call center employees completing a certain number of calls per hour

C.

Retrain call center staff on area processes and common technical issues that they will Likely be asked to resolve

D.

Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily

Full Access
Question # 27

Which of the following situations best applies to an organization that uses a project rather man a process to accomplish its business activities?

A.

A clothing company designs makes and sells a new item.

B.

A commercial constructor company is hired to build a warehouse.

C.

A city department sets up a new firefighter training program.

D.

A manufacturing organization acquires component parts from a contracted vendor

Full Access
Question # 28

All of the following are true with regard to the first-in, first-out inventory valuation method except:

A.

It values inventory close to current replacement cost.

B.

It generates the highest profit when prices are rising.

C.

It approximates the physical flow of goods.

D.

It minimizes current-period income taxes.

Full Access
Question # 29

Which mindset promotes the most comprehensive risk management strategy?

A.

Increase shareholder value.

B.

Maximize market share.

C.

Improve operational efficiency.

D.

Mitigate losses.

Full Access
Question # 30

For employees, the primary value of implementing job enrichment is which of the following?

A.

Validation of the achievement of their goals and objectives.

B.

Increased knowledge through the performance of additional tasks.

C.

Support for personal growth and a meaningful work experience.

D.

An increased opportunity to manage better the work done by their subordinates.

Full Access
Question # 31

According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?

A.

individual workstation computer controls are not as important as companywide server controls.

B.

Particular attention should be paid to housing workstations away from environmental hazards.

C.

Cybersecurity issues can be controlled at an enterprise level making workstation level controls

redundant

D.

With security risks near an all-time high workstations should not be connected to the company network

Full Access
Question # 32

Which of the following statements is true regarding the roles and responsibilities associated with a corporate social responsibility (CSR) program?

A.

The board has overall responsibility for the internal control processes associated with the CSR program.

B.

Management has overall responsibility for the effectiveness of governance, risk management, and internal control processes associated with the CSR program.

C.

The internal audit activity is responsible for ensuring that CSR principles are integrated into the

organization's policies and procedures.

D.

Every employee has a responsibility for ensuring the success of the organization's CSR objectives.

Full Access
Question # 33

Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?

A.

Intranet.

B.

Extranet.

C.

Digital subscriber line.

D.

Broadband.

Full Access
Question # 34

A small furniture-manufacturing firm with 100 employees is located in a two-story building and does not plan to expand. The furniture manufactured is not special-ordered or custom-made. The most likely structure for this organization would be:

A.

Functional departmentalization.

B.

Product departmentalization.

C.

Matrix organization.

D.

Divisional organization.

Full Access
Question # 35

At a manufacturing plant, how would using Internet of Things during the production process benefit the organization?

A.

It would provide the ability to monitor in real-time.

B.

It would assist in securing sensitive data.

C.

It would help detect cyberattacks in a more timely fashion.

D.

It would assist in ensuring that data integrity is maintained.

Full Access
Question # 36

Which of the following budgets serves as a basis for the budgeted income statement?

A.

All financial budgets

B.

All operating budgets

C.

Only the cash budget and budgeted balance sheet

D.

Only the sales and production budgets

Full Access
Question # 37

Which of me following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

A.

First-in first-out method (FIFO)

B.

Last-in first-out method (LIFO)

C.

Specific identification method

D.

Average-cost method

Full Access
Question # 38

An organization decided to install a motion detection system in its warehouse to protect against after-hours theft. According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?

A.

Avoidance.

B.

Reduction.

C.

Elimination.

D.

Sharing.

Full Access
Question # 39

Which of the following is useful for forecasting the required level of inventory?

1) Statistical modeling.

2) Information about seasonal variations in demand.

3) Knowledge of the behavior of different business cycles.

4) Pricing models linked to seasonal demand.

A.

1 and 2 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, 3, and 4

Full Access
Question # 40

Which of the following are typical audit considerations for a review of authentication?

1) Authentication policies and evaluation of controls transactions.

2) Management of passwords, independent reconciliation, and audit trail.

3) Control self-assessment tools used by management.

4) Independent verification of data integrity and accuracy.

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Full Access
Question # 41

Which of the following activities most significantly increases the risk that a bank will make poor-quality loans to its customers?

A.

Borrowers may not sign all required mortgage loan documentation.

B.

Fees paid by the borrower at the time of the loan may not be deposited in a timely manner.

C.

The bank's loan documentation may not meet the government's disclosure requirements.

D.

Loan officers may override the lending criteria established by senior management.

Full Access
Question # 42

Which of the following techniques is the most relevant when an internal auditor conducts a valuation of an organization's physical assets?

A.

Observation.

B.

Inspection.

C.

Original cost.

D.

Vouching.

Full Access
Question # 43

According to Porter's model of competitive strategy, which of the following is a generic strategy?

1 Differentiation.

2) Competitive advantage.

3) Focused differentiation.

4) Cost focus.

A.

2 only

B.

3 and 4 only

C.

1, 3, and 4 only

D.

1, 2, 3, and 4

Full Access
Question # 44

Which of the following phases of a business cycle are marked by an underuse of resources?

1) The trough.

2) The peak.

3) The recovery.

4) The recession.

A.

1 and 3 only

B.

1 and 4 only

C.

2 and 3 only

D.

2 and 4 only

Full Access
Question # 45

An organization needs to borrow a large amount of cash to fund its expansion plan. Which of the following annual interest rates is least expensive?

A.

7 percent simple interest with a 10 percent compensating balance.

B.

7 percent simple interest paid at the end of each year.

C.

7 percent discount interest.

D.

7 percent compounding interest.

Full Access
Question # 46

The economic order quantity can be calculated using the following formula:

Which of the following describes how the optimal order size will change if the annual demand increases by 36 percent?

A.

Decrease by about 17 percent.

B.

Decrease by about 7 percent.

C.

Increase by about 7 percent.

D.

Increase by about 17 percent.

Full Access
Question # 47

Providing knowledge, motivating organizational members, controlling and coordinating individual efforts, and expressing feelings and emotions are all functions of:

A.

Motivation.

B.

Performance.

C.

Organizational structure.

D.

Communication.

Full Access
Question # 48

Which of the following is a limiting factor for capacity expansion?

A.

Government pressure on organizations to increase or maintain employment.

B.

Production orientation of management.

C.

Lack of credible market leader in the industry.

D.

Company diversification.

Full Access
Question # 49

Which of the following local area network physical layouts is subject to the greatest risk of failure if one device fails?

A.

Star network.

B.

Bus network.

C.

Token ring network.

D.

Mesh network.

Full Access
Question # 50

An internal auditor is trying to assess control risk and the effectiveness of an organization's internal controls. Which of the following audit procedures would not provide assurance to the auditor on this matter?

A.

Interviewing the organization's employees.

B.

Observing the organization's operations.

C.

Reading the board's minutes.

D.

Inspecting manuals and documents.

Full Access
Question # 51

Which of the following is not a barrier to effective communication?

A.

Filtering.

B.

Communication overload.

C.

Similar frames of reference.

D.

Lack of source credibility.

Full Access
Question # 52

According to the COSO enterprise risk management (ERM) framework, which of the following is not a typical responsibility of the chief risk officer?

A.

Establishing risk category definitions and a common risk language for likelihood and impact measures.

B.

Defining ERM roles and responsibilities.

C.

Providing the board with an independent, objective risk perspective on financial reporting.

D.

Guiding integration of ERM with other management activities.

Full Access
Question # 53

When granting third parties temporary access to an entity's computer systems, which of the following is the most effective control?

A.

Access is approved by the supervising manager.

B.

User accounts specify expiration dates and are based on services provided.

C.

Administrator access is provided for a limited period.

D.

User accounts are deleted when the work is completed.

Full Access
Question # 54

According to IIA guidance, which of the following corporate social responsibility (CSR) activities is appropriate for the internal audit activity to perform?

A.

Determine the optimal amount of resources for the organization to invest in CSR.

B.

Align CSR program objectives with the organization's strategic plan.

C.

Integrate CSR activities into the organization's decision-making process.

D.

Determine whether the organization has an appropriate policy governing its CSR activities.

Full Access
Question # 55

Which of the following assumptions regarding cost-volume-profit analysis is true?

A.

Costs are affected by changes in activity only.

B.

The behavior of costs and revenues is inverse.

C.

When more than one type of product is sold, the sales mix changes.

D.

Only variable costs have to be classified accurately.

Full Access
Question # 56

Which of the following statements is true with regard to information protection?

A.

All personal information, by definition is considered to be sensitive, requiring specialized controls.

B.

Information is not considered personal if it can only be linked to or used to identify an individual indirectly.

C.

Individuals who provide personal information to organizations share in the risk of inappropriate

disclosure.

D.

Good protection controls remove any restrictions on the quantity of personal information that can be collected

Full Access
Question # 57

Which of the following should software auditors do when reporting internal audit findings related to enterprise wide resource planning?

A.

Draft separate audit reports for business and IT management

B.

Connect IT audit findings to business issues

C.

Include technical details to support IT issues

D.

Include an opinion on financial reporting accuracy and completeness

Full Access
Question # 58

Which of the following are the most common characteristics of big data?

A.

Visibility, validity, vulnerability

B.

Velocity, variety volume.

C.

Complexity completeness constancy

D.

Continuity, control convenience

Full Access
Question # 59

Which of the following is a characteristic of using a hierarchical control structure?

A.

Less use of policies and procedures

B.

Less organizational commitment by employees

C.

Less emphasis on extrinsic rewards

D.

Less employees turnover

Full Access
Question # 60

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

A.

Session hijacking.

B.

Jailbreaking.

C.

Eavesdropping.

D.

Authentication.

Full Access
Question # 61

Which of the following is improved by the use of smart devices?

A.

Version control

B.

Privacy

C.

Portability

D.

Secure authentication

Full Access
Question # 62

Which of the following actions would senior management need to consider as pan of new IT guidelines regarding the organization's cybersecurity policies?

A.

Assigning new roles and responsibilities for senior IT management.

B.

Growing use of bring your own devices tor organizational matters

C.

Expansion of operations into new markets with united IT access

D.

Hiring new personnel within the IT department tor security purposes

Full Access
Question # 63

What would an internal auditor do to ensure that a process to mitigate risk is in place for the organization's change management process?

A.

Develop and enforce change policies to ensure employees are continually trained.

B.

Apply a risk-based approach and impose segregation of duties related to the change management process.

C.

Conduct a high-level threat analysis and implement a compensating control.

D.

Validate authorization, segregation of duties, testing of changes, and approval to move changes into production.

Full Access
Question # 64

According to IIA guidance, which of the following statements is true regarding analytical procedures?

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences but cannot be used to identify the absence of differences

Full Access
Question # 65

Which of the following characteristics applies to an organization that adopts a flat structure?

A.

The structure is dispersed geographically.

B.

The hierarchy levels are more numerous.

C.

The span of control is wide.

D.

The lower-level managers are encouraged to exercise creativity when solving problems.

Full Access
Question # 66

According to MA guidance on IT. which of the following controls the routing of data packets to link computers?

A.

Operating system.

B.

Control environment.

C.

Network.

D.

Application program code.

Full Access
Question # 67

Which of the following is an example of a phishing attack?

A.

An employee receives an email that appears to be from the organization's bank, though it is not. The employee replies to the email and sends the requested confidential information.

B.

An organization's website has been hacked. The hacker added political content that is not consistent with the organization's views.

C.

An organization's systems have been compromised by malicious software. The software locks the organization's operating system until d ransom is paid.

D.

An organization's communication systems have been intercepted. A communication session is controlled by an unauthorized third party.

Full Access
Question # 68

According to IIA guidance on IT. which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?

A.

Formulas and static data are locked or protected.

B.

The spreadsheet is stored on a network server that is backed up daily.

C.

The purpose and use of the spreadsheet are documented.

D.

Check-in and check-out software is used to control versions.

Full Access
Question # 69

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity.

Full Access
Question # 70

An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?

A.

To verify that the application meets staled user requirements.

B.

To verify that standalone programs match code specifications.

C.

To verify that me application would work appropriately for the intended number of users.

D.

To verify that all software and hardware components work together as intended

Full Access
Question # 71

Which of the following control features consists of a set of authorization codes that distinguishes among actions such as reading, adding, and deleting records?

A.

Internally encrypted passwords

B.

System access privileges.

C.

Logon passwords

D.

Protocol controls.

Full Access
Question # 72

Listening effectiveness is best increased by:

A.

Resisting both internal and external distractions.

B.

Waiting to review key concepts until the speaker has finished talking.

C.

Tuning out messages that do not seem to fit the meeting purpose.

D.

Factoring in biases in order to evaluate the information being given.

Full Access
Question # 73

Which of the following would best prevent unauthorized external changes to an organization's data?

A.

Antivirus software, firewall, data encryption.

B.

Firewall, data encryption, backup procedures.

C.

Antivirus software, firewall, backup procedures.

D.

Antivirus software, data encryption, change logs.

Full Access