Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part3 Exam Dumps - Business Knowledge for Internal Auditing

Go to page:
Question # 25

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

A.

The risk that users try to bypass controls and do not install required software updates

B.

The risk that smart devices can be lost or stolen due to their mobile nature

C.

The risk that an organization intrusively monitors personal information stored on smart devices

D.

The risk that proprietary information is not deleted from the device when an employee leaves

Full Access
Question # 26

During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?

A.

Initiation phase

B.

Bidding phase

C.

Development phase

D.

Negotiation phase

Full Access
Question # 27

An organization’s account for office supplies on hand had a balance of $9,000 at the end of year one. During year two, the organization recorded an expense for purchasing office supplies. At the end of year two, a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?

A.

A debit to office supplies on hand for $2,500

B.

A debit to office supplies on hand for $11,500

C.

A debit to office supplies on hand for $20,500

D.

A debit to office supplies on hand for $42,500

Full Access
Question # 28

When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?

A.

The organization reports inappropriate estimates and accruals due to poof accounting controls.

B.

The organization uses an unreliable process forgathering and reporting executive compensation data.

C.

The organization experiences increasing discontent of employees, if executives are eligible for compensation amounts that are deemed unreasonable.

D.

The organization encourages employee behavior that is inconsistent with the interests of relevant stakeholders.

Full Access
Question # 29

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?

A.

Firewall.

B.

Encryption.

C.

Antivirus.

D.

Biometrics.

Full Access
Question # 30

The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?

A.

Commissions.

B.

Stock options

C.

Gain-sharing bonuses.

D.

Allowances

Full Access
Question # 31

Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?

A.

Cash payback technique

B.

Annual rate of return technique.

C.

Internal rate of return method.

D.

Net present value method.

Full Access
Question # 32

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

A.

An extranet.

B.

A local area network (LAN).

C.

An intranet.

D.

The internet.

Full Access
Go to page: