Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following IIA-CRMA Exam is Retired now. Please select the alternative replacement for your Exam Certification.

IIA-CRMA Exam Dumps - Certification in Risk Management Assurance (CRMA) Exam

Question # 4

According to the Standards, for how long should internal auditors who have previously performed or had management responsibility for an operation wait to become involved in future internal audit activity with that same operation?

A.

Three months.

B.

Six months.

C.

One year.

D.

Two years.

Full Access
Question # 5

Which of the following statements describes a control failure that is not directly attributable to a customer billing application?

1. End users have raised a number of concerns regarding data integrity.

2. An untested program change is transferred from the test environment to production.

3. Purchase history does not reconcile with accounts receivable for some customers.

4. End user security is inadvertently granted to an unauthorized individual by management.

A.

1 and 3.

B.

1 and 4.

C.

2 and 3.

D.

2 and 4.

Full Access
Question # 6

Which of the following actions indicates a lack of due professional care by an internal auditor performing an audit of a store's cash function?

A.

The audit report included a well-supported recommendation for a reduction in staff even though such a reduction might adversely impact morale.

B.

The auditor tested samples of transactions to test the cash function's process flows.

C.

After determining that the cash function internal controls were strong, the audit report assured senior management that fraud was not present.

D.

The auditor discovered an instance of potential fraud and reported it immediately to management, but did not alert authorities outside the organization.

Full Access
Question # 7

During an internal audit, an organization's processing department is found to have incidences of both duplicate invoices and notices from customers that purchased goods were not received. The department under review insists that some of these reports are false and that others were isolated oversights due to understaffing.

Which of the following tests would best help the internal auditor detect fraudulent activity?

A.

Check inventory levels.

B.

Search for gaps in check numbers.

C.

Compare vendor summaries.

D.

Review raw material purchase quantities.

Full Access
Question # 8

Which of the following techniques would best assist an internal auditor in evaluating the efficiency of a wholesale grocery distributor`s process to fill and package orders for shipping?

A.

A Bedford analysis of orders filled to average delivery times.

B.

Decision trees rating actual performance against requirements.

C.

Queuing theory to assess potential bottlenecks in the process.

D.

A program evaluation and review technique chart.

Full Access
Question # 9

If appropriate safeguards exist, which of the following is considered a legitimate internal audit role within risk management at an organization?

A.

Imposing risk management processes.

B.

Providing consolidated reporting on risks.

C.

Taking accountability for risk management.

D.

Making decisions on risk responses.

Full Access
Question # 10

Forty-five percent of an organization's customer payments are submitted online. Eight percent of online payments are rejected. Executive management decides to outsource its online payment services to a contractor that will assume 75 percent of the total value of rejected payments. The organization estimates $1.25 million customer payments due during the contract period.

Which of the following represents the organization's residual risk for online customer payments due?

A.

$11, 250

B.

$25, 000

C.

$33, 750

D.

$45, 000

Full Access
Question # 11

Which of the following statements describes impairment to the internal auditor's objectivity?

A.

An internal auditor reviews a purchasing agent's contract drafts prior to their execution.

B.

An internal auditor reduces the scope of an audit engagement due to budget restrictions.

C.

An internal auditor receives a promotional gift that is available to the organization's employees.

D.

An internal auditor performs an assessment of the operations for which he was recently responsible.

Full Access
Question # 12

While performing an accounts payable engagement, a senior auditor wants to conduct several tests of controls for travel expenses. Which of the following actions are most appropriate for the senior auditor to undertake?

1. Ensure all tests use a random sampling technique.

2. Consider a judgmental approach for the sample size.

3. Assess testing errors through root cause analysis.

4. Ensure that the entire data set is tested.

A.

1 and 2.

B.

1 and 3.

C.

2 and 3.

D.

2 and 4.

Full Access
Question # 13

A snow removal company is conducting a scenario planning exercise where participating employees consider the potential impacts of a significant reduction in annua snowfall for the coming winter. Which of the following best describes this type of risk?

A.

Residual.

B.

Net.

C.

Inherent.

D.

Accepted.

Full Access
Question # 14

Which of the following behaviors could represent a significant ethical risk if exhibited by an organization's board?

A.

Requesting a private meeting with senior management, without the presence of the chief audit executive.

B.

Intervening during an audit involving ethical wrongdoing.

C.

Discussing periodic reports of ethical breaches.

D.

Authorizing an investigation of an unsafe product.

Full Access
Question # 15

During an audit, the client questions the internal audit activity's authority to perform procedures over fraud allegations. According to HA guidance, which of the following would provide the most relevant support to respond to the client's concerns?

A.

Definition of Internal Auditing.

B.

MA Standards.

C.

Internal audit charter.

D.

The IIA's Code of Ethics.

Full Access
Question # 16

What is the additional advantage of facilitated workshops, in comparison with structured interviews, used when testing the effectiveness of entity-level controls?

A.

During facilitated workshops, people more openly say things to internal auditors than during private interviews.

B.

Internal auditors do not need other sources of information, as the data gathered during facilitated workshops is sufficient.

C.

Facilitated workshops create a synergy of discussion that can bring multiple perspectives to the same issue.

D.

The testimonial evidence obtained during facilitated workshops is generally considered more reliable.

Full Access
Question # 17

Faced with a complex, highly technical construction audit engagement, the chief audit executive (CAE) considered complementing the current internal audit resources by engaging the services of a civil engineer.

Which of the following should the CAE consider in determining whether the engineer possesses the necessary skills to perform the engagement?

1. Professional certification, license, or other recognition of the engineer's competence in the relevant discipline.

2. Experience of the engineer in the type of work being considered.

3. Compensation or other incentives that the engineer may receive.

4. The extent of other ongoing services that the engineer may be performing for the organization.

A.

1 and 4 only

B.

2 and 3 only

C.

3 and 4 only

D.

1, 2, and 4 only

Full Access
Question # 18

A medical insurance provider uses an electronic claims-submission process and suspects that a number of physicians have submitted claims for treatments that were not performed. Which of the following control procedures would be most effective to detect this type of fraud?

A.

Require the physician to submit a signed statement attesting that the treatments had been performed.

B.

Send confirmations to the physicians, requesting them to verify the exact nature of the claims submitted to the insurance provider.

C.

Develop an integrated test facility and submit false claims to verify that the system is detecting such claims on a consistent basis.

D.

Use computer software to identify abnormal claims based on the insured's age and medical history.

Full Access
Question # 19

When auditing the award of a major contract, which of the following should an internal auditor suspect as a red flag for a bidding fraud scheme?

1. Subsequent change orders increase requirements for low-bid items.

2. Material contract requirements are different on the actual contract than on the request for bids.

3. A high percentage of employees are charged to indirect accounts.

4. Losing bidders are hired as subcontractors.

A.

1 only

B.

2 only

C.

1 and 3.

D.

2 and 4.

Full Access
Question # 20

Which of the following items should the chief audit executive disclose to senior management regarding the results of the internal audit activity's quality assessments?

A.

The internal audit activity's plan for resource allocation.

B.

The amount of the organization's potential loss prevented by the risk-based auditing of the internal audit activity.

C.

The number of audits from the annual internal audit plan that were completed last year.

D.

The qualifications and independence of the assessment Team.

Full Access
Question # 21

According to IIA guidance, which of the following statements describes one of the similarities between assurance and consulting services?

A.

When planning assurance and consulting engagements, internal auditors must consider the strategies and objectives of the activity being reviewed.

B.

Internal auditors determine the engagement objectives, scope, and work program for both assurance and consulting services.

C.

Internal auditors must not provide assurance or consulting services for an activity for which they had responsibility within the previous year.

D.

Both assurance and consulting services generally involve the internal auditor, the area under review, senior management, and the board.

Full Access
Question # 22

Which of the following types of social responsibilities is voluntary and guided purely by the organization's desire to make social contributions?

A.

The bottom of the pyramid responsibility.

B.

Innovative responsibility.

C.

Ethical responsibility.

D.

Discretionary responsibility.

Full Access
Question # 23

Which of the following actions does not violate the IIA Code of Ethics or Standards?

A.

An internal auditor performing an audit on an operation that they managed less than a year ago.

B.

An internal auditor performing an audit on procedures that they were responsible for creating.

C.

An internal auditor disclosing details of an audit report to colleagues from a different organization.

D.

An internal auditor disclosing confidential information in response to a lawsuit.

Full Access
Question # 24

Which of the following is not one of the 10 core competencies identified in the IIA Competency Framework?

A.

Governance, risk, and control.

B.

Performance management.

C.

Business acumen.

D.

Internal audit delivery.

Full Access
Question # 25

Which of the following options is the most cost-effective and efficient way for internal auditors to keep current with the latest developments in the internal audit profession?

A.

Attending annual professional conferences and seminars.

B.

Participating in on-the-job training in various departments of the organization.

C.

Pursuing as many professional certifications as possible.

D.

Maintaining membership in The HA and similar professional organizations and subscribing to relevant email updates or news feeds.

Full Access
Question # 26

Which of the following is an example of a management control technique?

A.

A budget.

B.

A risk assessment.

C.

The board of directors.

D.

The control environment.

Full Access
Question # 27

Which of the following is not a standard technique that the chief audit executive (CAE) would use to provide evidence of supervisory review of working papers?

A.

The CAE initials and dates every working paper after it has been reviewed.

B.

The CAE completes an engagement working paper checklist.

C.

The CAE prepares a memorandum discussing the results of the working paper review.

D.

The CAE utilizes an external third party to make an objective recommendation after each working paper review.

Full Access
Question # 28

While attending a conference, an internal auditor won an all-expense paid trip sponsored by a vendor of the internal auditor's organization.

Which of the following actions are most appropriate for the auditor to take?

A.

Consult with an immediate supervisor and notify the organization's audit committee.

B.

Consult with an immediate supervisor and review the organization's ethics policy.

C.

Give the prize to a friend or family member and notitfy the organization's audit committee.

D.

Give the prize to a friend or family member and review the organization's ethics policy.

Full Access
Question # 29

Which of the following is an example of a transaction-level control?

A.

Human resource policies.

B.

Tone at the top.

C.

Reconciliations of primary accounts.

D.

Inventory counts.

Full Access
Question # 30

According to IIA guidance, which of the following objectives of an assurance engagement for the organization's risk management process is valid?

A.

All risks have been identified and mitigated.

B.

Risks have been accurately analyzed and evaluated.

C.

All controls are both adequate and efficient.

D.

The board is appropriately addressing intolerable risks.

Full Access
Question # 31

Which type of objectives can best be described as broad goals that promote the effective and efficient use of resources?

A.

Strategic objectives.

B.

Operational objectives.

C.

Reporting objectives.

D.

Compliance objectives.

Full Access
Question # 32

While auditing an organization's credit approval process, an internal auditor learns that the organization has made a large loan to another auditor's relative. Which course of action should the auditor take?

A.

Proceed with the audit engagement, but do not include the relative's information.

B.

Have the chief audit executive and management determine whether the auditor should continue with the audit engagement.

C.

Disclose in the engagement final communication that the relative is a customer.

D.

Immediately withdraw from the audit engagement.

Full Access
Question # 33

According to IIA guidance, which of the following roles would be appropriate for an internal auditor regarding fraud risk?

1. Identification.

2. Mitigation.

3. Remediation.

4. Reduction.

A.

1 only. |

B.

1 and 4 only.

C.

1, 3, and 4 only.

D.

1,2, 3, and 4.

Full Access
Question # 34

Non-statistical sampling does not require which of the following?

A.

The sample to be representative of the population.

B.

The sample to be selected haphazardly.

C.

A smaller sample size than if selected using statistical sampling.

D.

Projecting the results to the population.

Full Access
Question # 35

An organization is beginning to implement an enterprise risk management program. One of the first steps is to develop a common risk language. Which of the following statements about a common risk language is true?

A.

Management will be able to reduce inherent risk because they will have a better understanding of risk.

B.

Internal auditors will be able to reduce their sample sizes because controls will be more consistent.

C.

Stakeholders will have more assurance that the risks are assessed consistently.

D.

Decision makers will understand that the likelihood of missing or ineffective controls will be reduced.

Full Access
Question # 36

Which of the following combinations of conditions is most likely a red flag for fraud?

A.

The practice of surprise audits and the implementation of an employee support program.

B.

Hiring an employee with a prior fraud conviction and yearly management review.

C.

Occasional accounting department overrides and discontinuation of the anonymous fraud hotline due to infrequent use.

D.

A veteran employee in upper management experiencing financial difficulties and recently implemented enhanced controls.

Full Access
Question # 37

According to IIA guidance, which of the following is the best example of a system application control?

A.

A physical security control over a data center.

B.

A system development life cycle control.

C.

A program change management control.

D.

An input control over data integrity.

Full Access
Question # 38

After being terminated due to downsizing, an internal auditor finds a different job with an organization in the same industry. Which of the following actions would violate the IIA Code of Ethics?

A.

To determine audit priorities in the new job, the auditor uses the audit risk approach that the auditor's previous employer used, without receiving permission to do so.

B.

At the new organization, the auditor is asked to develop forms to implement probability-proportional-to-size sampling. Although unsure of how to perform this type of sampling, the auditor proceeds without asking for assistance.

C.

In preparing for an audit at the previous organization, the auditor had conducted a great deal of research on the Internet at home to identify best practices for the management of a treasury function. The auditor has retained much of the research and uses it to conduct an audit of the new employer's treasury function.

D.

In the first week at the new organization, the auditor discovers a high fraud risk surrounding the organization's database and suggests that the information technology department implement a new password system to prevent fraudulent actions before they occur.

Full Access
Question # 39

Which of the following would not be a red flag for fraud?

A.

Several recent, large expenditures to a new vendor have not been documented.

B.

A manager has bragged about multiple extravagant vacations taken within the last year, which are excessive relative to the manager's salary.

C.

A weak control environment has been accepted by management to encourage creativity.

D.

New employees occasionally fail to meet established project deadlines due to staffing shortages.

Full Access
Question # 40

Which of the following controls is not appropriate for sales in a manufacturing organization?

A.

Customers' orders are recorded promptly.

B.

Goods shipped are matched with valid customer orders.

C.

Goods returned are inspected for damage by the receiving department for proper disposition.

D.

Sales department approval is required for credit sales transactions.

Full Access
Question # 41

A chief audit executive (CAE) of an international charity reports functionally to the audit committee of the board of directors and administratively to the charity's chief financial officer (CFO).

Which of the following would impair the internal audit function's independence?

A.

The CFO determines the scope of internal audit work in the accounting department.

B.

The CFO manages the accounting of the budget for the internal audit function.

C.

The CFO administers the annual evaluation process for the internal auditors.

D.

The CFO provides feedback on the CAE's audit reports.

Full Access
Question # 42

Allegations have been made that an organization's share price has been manipulated.

Which of the following would provide an internal auditor with the most objective evidence in this case?

A.

Major shareholders of the organization.

B.

Large customers of the organization.

C.

Former members of management.

D.

Former financial consultants.

Full Access