Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part3 Exam Dumps - Business Knowledge for Internal Auditing

Go to page:
Question # 57

A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?

A.

Fixed and variable manufacturing costs are less than the special offer selling price

B.

The manufacturer can fulfill the order without expanding the capacities of the production facilities

C.

Costs related to accepting this offer can be absorbed through the sale of other products

D.

The manufacturer’s production facilities are currently operating at full capacity

Full Access
Question # 58

An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?

A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data

B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process

C.

Institute detection and authentication controls for all devices used for network connectivity and data storage

D.

Use management software to scan and then prompt patch reminders when devices connect to the network

Full Access
Question # 59

Which of the following responsibilities would ordinarily fall under the help desk function of an organization?

A.

Maintenance service items such as production support

B.

Management of infrastructure services, including network management

C.

Physical hosting of mainframes and distributed servers

D.

End-to-end security architecture design

Full Access
Question # 60

According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?

A.

Report identifying data that is outside of system parameters.

B.

Report identifying general ledger transactions by time and individual.

C.

Report comparing processing results with original input.

D.

Report confirming that the general ledger data was processed without error.

Full Access
Question # 61

Which of the following security controls would be appropriate to protect the exchange of information?

A.

Firewalls.

B.

Activity logs.

C.

Antivirus software.

D.

File encryption.

Full Access
Question # 62

Which of the following IT-related activities is most commonly performed by the second line of defense?

A.

Block unauthorized traffic.

B.

Encrypt data.

C.

Review disaster recovery test results.

D.

Provide an independent assessment of IT security.

Full Access
Question # 63

According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

A.

The business continuity management charter

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Full Access
Question # 64

In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?

A.

Vertical integration.

B.

Unrelated diversification.

C.

Differentiation

D.

Focus

Full Access
Go to page: