Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

IIA-CIA-Part3-3P CIA Exam Part Three: Business Knowledge for Internal Auditing Questions and Answers

Questions 4

What are the objectives of governance as defined by the Standards?

Options:

A.

Inform, direct, manage, and monitor.

B.

Identify, assess, manage, and control.

C.

Organize, assign, authorize, and implement.

D.

Add value, improve, assure, and conform.

Buy Now
Questions 5

Which of the following methods, if used in conjunction with electronic data interchange (EDI), will improve the organization's cash management program, reduce transaction data input time and errors, and allow the organization to negotiate discounts with EDI vendors based on prompt payment?

Options:

A.

Electronic funds transfer.

B.

Knowledge-based systems.

C.

Biometrics.

D.

Standardized graphical user interface.

Buy Now
Questions 6

During the last year, an organization had an opening inventory of $300,000, purchases of $980,000, sales of $1,850,000, and a gross margin of 40 percent. What is the closing inventory if the periodic inventory system is used?

Options:

A.

$170,000

B.

$280,000

C.

$300,000

D.

$540,000

Buy Now
Questions 7

Which of the following is true regarding an organization's relationship with external stakeholders?

Options:

A.

Specific guidance must be followed when interacting with nongovernmental organizations.

B.

Disclosure laws tend to be consistent from one jurisdiction to another.

C.

There are several internationally recognized standards for dealing with financial donors.

D.

Legal representation should be consulted before releasing internal audit information to other assurance

Buy Now
Questions 8

During which phase of disaster recovery planning should an organization identify the business units, assets, and systems that are critical to continuing an acceptable level of operations?

Options:

A.

Scope and initiation phase.

B.

Business impact analysis.

C.

Plan development.

D.

Testing.

Buy Now
Questions 9

Which of the following statements is true regarding the risks associated with the increased use of smart devices at work?

Options:

A.

Due to their small size and portability smart devices and their associated data are typically less susceptible to physical loss

B.

The Bluetooth and WI-FI features of smart devices enhance the security of data while in transit

C.

The global positioning system (GPS) capability of smart devices could be exploited to plan cyberattacks

D.

When the user fads to perform jailbreaking or rooting, data security and privacy risks we increased

Buy Now
Questions 10

An organization's network administrator received an email that appeared to come from the organization's external IT service provider requesting his credentials to perform an update of a server operating system If the IT service provider did not send the email, which of the following best describes the likely purpose of the email?

Options:

A.

An attempt at phishing.

B.

An attempt at penetration testing

C.

An attempt to patch the server

D.

An attempt to launch malware

Buy Now
Questions 11

Which of the following is a primary objective of the theory of constraints?

Options:

A.

Full or near capacity in processes.

B.

Smooth workflow among processes.

C.

Few or no defects.

D.

Lowered inventory levels.

Buy Now
Questions 12

Which of the following must be adjusted to index a progressive tax system to inflation?

Options:

A.

Tax deductions, exemptions, and tax filings.

B.

Tax deductions, exemptions, and tax brackets.

C.

Tax brackets, tax deductions, and tax payments.

D.

Tax brackets, exemptions, and nominal tax receipts.

Buy Now
Questions 13

Maintenance cost at a hospital was observed to increase as activity level increased. The following data was gathered:

Activity Level -

Maintenance Cost

Month

Patient Days

January

5,600

$7,900

February

7,100

$8,500

March

5,000

$7,400

April

6,500

$8,200

May

7,300

$9,100

June

8,000

$9,800

If the cost of maintenance is expressed in an equation, what is the independent variable for this data?

Options:

A.

Fixed cost.

B.

Variable cost.

C.

Total maintenance cost.

D.

Patient days.

Buy Now
Questions 14

Which of the following is the best approach to overcome entry barriers into a new business?

Options:

A.

Offer a standard product that is targeted in the recognized market.

B.

Invest in commodity or commodity-like product businesses.

C.

Enter into a slow-growing market.

D.

Use an established distribution relationship.

Buy Now
Questions 15

When granting third parties temporary access to an entity's computer systems, which of the following is the most effective control?

Options:

A.

Access is approved by the supervising manager.

B.

User accounts specify expiration dates and are based on services provided.

C.

Administrator access is provided for a limited period.

D.

User accounts are deleted when the work is completed.

Buy Now
Questions 16

Unsecured loans are loans:

Options:

A.

That do not have to be repaid for over one year.

B.

That appear to be too risky for most lenders to consider.

C.

Granted on the basis of a company's credit standing.

D.

Backed by mortgaged assets.

Buy Now
Questions 17

Which of the following is the best reason for considering the acquisition of a nondomestic organization?

Options:

A.

Relatively fast market entry.

B.

Improved cash flow of the acquiring organization.

C.

Increased diversity of corporate culture.

D.

Opportunity to influence local government policy.

Buy Now
Questions 18

An organization is considering mirroring the customer data for one regional center at another center. A disadvantage of such an arrangement would be:

Options:

A.

Lack of awareness of the state of processing.

B.

Increased cost and complexity of network traffic.

C.

Interference of the mirrored data with the original source data.

D.

Confusion about where customer data are stored.

Buy Now
Questions 19

Which of the following performance measures would be appropriate for evaluating an investment center, which has responsibility for its revenues, costs, and investment base, but would not be appropriate for evaluating cost, revenue, or profit centers?

Options:

A.

A flexible budget.

B.

Variance analysis.

C.

A contribution margin income statement by segment.

D.

Residual income.

Buy Now
Questions 20

An employee's mobile device used for work was stolen in a home burglary.

Which control, if already implemented by the organization, would best prevent unauthorized access to organizational data stored on the employee's device?

Options:

A.

Access control via biometric authentication.

B.

Access control via passcode authentication.

C.

Access control via swipe pattern authentication.

D.

Access control via security question authentication.

Buy Now
Questions 21

According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization's network and data?

Options:

A.

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations

B.

Drafting a strong contract that requires regular vendor control reports and a right-to-audit clause.

C.

Applying administrative privileges to ensure right-to-access controls are appropriate

D.

Creating a standing cybersecurity committee to identify and manage risks related to data security

Buy Now
Questions 22

According to HerzBerg's Two-Factor Theory of Motivation, which of the following factors ate mentioned most often By satisfied employees?

Options:

A.

Salary and status

B.

Responsibility and advancement

C.

Work conditions and security

D.

Peer relationships and personal life

Buy Now
Questions 23

Which of the following types of budgets will best provide the basis for evaluating the organization's performance?

Options:

A.

Cash budget.

B.

Budgeted balance sheet.

C.

Selling and administrative expense budget.

D.

Budgeted income statement.

Buy Now
Questions 24

Which of the following is an example of a key systems development control typically found in the in-house development of an application system?

Options:

A.

Logical access controls monitor application usage and generate audit trails.

B.

The development process is designed to prevent, detect and correct errors that may occur

C.

A record is maintained to track the process of data from input, to output, to storage

D.

Business users' requirements are documented, and their achievement is monitored

Buy Now
Questions 25

A manager who is authorized to make purchases up to a certain dollar amount approves the set-up of a fictitious vendor and subsequently initiates purchase orders.

Which of the following controls would best address this risk?

Options:

A.

Establish separate vendor creation and approval teams.

B.

Develop and distribute a code of conduct that prohibits conflicts of interest.

C.

Perform a regular review of the vendor master file.

D.

Require submission of a conflict-of-interest declaration.

Buy Now
Questions 26

Which of the following should software auditors do when reporting internal audit findings related to enterprise wide resource planning?

Options:

A.

Draft separate audit reports for business and IT management

B.

Connect IT audit findings to business issues

C.

Include technical details to support IT issues

D.

Include an opinion on financial reporting accuracy and completeness

Buy Now
Questions 27

Which of the following statements is true with regard to information protection?

Options:

A.

All personal information, by definition is considered to be sensitive, requiring specialized controls.

B.

Information is not considered personal if it can only be linked to or used to identify an individual indirectly.

C.

Individuals who provide personal information to organizations share in the risk of inappropriate

disclosure.

D.

Good protection controls remove any restrictions on the quantity of personal information that can be collected

Buy Now
Questions 28

Which of the following security controls would provide the most efficient and effective authentication for customers to access their online shopping account?

Options:

A.

12-digit password feature.

B.

Security question feature.

C.

Voice recognition feature.

D.

Two-level sign-on feature.

Buy Now
Questions 29

An organization has received funding to continue a program that utilizes an in-house Due to new legislative requirements the application will require additional features to capture information not previously collected Which of the following is the most critical for completing this specific project?

Options:

A.

A detailed budget that identifies hardware resources for the project

B.

A Gantt chart that identifies the critical path for completing the project

C.

Change management controls to avoid technical conflicts within the application

D.

A project plan with a flexible scope to accommodate legislative requirements

Buy Now
Questions 30

For employees, the primary value of implementing job enrichment is which of the following?

Options:

A.

Validation of the achievement of their goals and objectives.

B.

Increased knowledge through the performance of additional tasks.

C.

Support for personal growth and a meaningful work experience.

D.

An increased opportunity to manage better the work done by their subordinates.

Buy Now
Questions 31

Which of the following IT operational areas is responsible for the integrity of data flow within an

organization?

Options:

A.

Network

B.

Database

C.

Operating system

D.

Server

Buy Now
Questions 32

The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization.

Which of the following methods of compensation would be best to achieve this goal?

Options:

A.

Commissions.

B.

Stock options.

C.

Gain-sharing bonuses.

D.

Allowances.

Buy Now
Questions 33

In an organization's established accounts payable department employees perform highly structured activities follow clearly defined procedures and have strict deadlines for performing their tasks The head of the department recently retired, and a new department head was hired To achieve the greatest benefit for this department and avoid redundancy the new leader should adopt which of the following leadership styles?

Options:

A.

Achievement-oriented style

B.

People-oriented style

C.

Goal-oriented style

D.

Task-oriented style

Buy Now
Questions 34

Which of me following responsibilities would ordinary fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support

B.

Management of infrastructure services including network management

C.

Physical hosting of mainframes and distributed servers

D.

End-to-end security architecture design

Buy Now
Questions 35

With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?

Options:

A.

Determining the frequency with which backups will be performed.

B.

Prioritizing the order in which business systems would be restored.

C.

Assigning who in the IT department would be involved in the recovery procedures.

D.

Assessing the resources needed to meet the data recovery objectives

Buy Now
Questions 36

Which of the following statements is true regarding reversing entries in an accounting cycled

Options:

A.

Reversing all previous closing adjustments is a mandatory step in the accounting cycle

B.

Reversing entries should be completed at the end of the next accounting period after recording regular transactions of the period

C.

Reversing entries are identical to the adjusting entries made in the previous period.

D.

Reversing entries are the exact opposite of the adjustments made in the previous period.

Buy Now
Questions 37

An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is unable to get the desired return on investment and output per hour of labor. Based on this information the organization is most likely focused on which of the following?

Options:

A.

Capital investment and not marketing

B.

Marketing and not capital investment.

C.

Efficiency and not input economy.

D.

Effectiveness and not efficiency.

Buy Now
Questions 38

Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?

Options:

A.

Continually evaluate the needs and opinions of all stakeholder groups.

B.

Ensure strict compliance with applicable laws and regulations to avoid incidents.

C.

Maintain a comprehensive publicity campaign that highlights the organization's efforts.

D.

Increase goodwill through philanthropic activities among stakeholder communities.

Buy Now
Questions 39

According to IIA guidance on IT auditing, which of the following would not be an area examined by the internal audit activity?

Options:

A.

Access system security.

B.

Policy development.

C.

Change management.

D.

Operations processes.

Buy Now
Questions 40

Which of the following strategies would most likely prevent an organization from adjusting to evolving industry market conditions?

Options:

A.

Specializing in proven manufacturing techniques that have made the organization profitable in the past.

B.

Substituting its own production technology with advanced techniques used by its competitors.

C.

Forgoing profits over a period of time to gain market share from its competitors.

D.

Using the same branding to sell its products through new sales channels to target new markets.

Buy Now
Questions 41

In which type of business environment are price cutting strategies and franchising strategies most appropriate?

Options:

A.

Embryonic, focused.

B.

Fragmented, decline.

C.

Mature, fragmented.

D.

Competitive, embryonic.

Buy Now
Questions 42

Which of the following is a limiting factor for capacity expansion?

Options:

A.

Government pressure on organizations to increase or maintain employment.

B.

Production orientation of management.

C.

Lack of credible market leader in the industry.

D.

Company diversification.

Buy Now
Questions 43

Which of the following is the primary benefit of including end users in the system development process?

Options:

A.

Improved integrity of programs and processing.

B.

Enhanced ongoing maintenance of the system.

C.

Greater accuracy of the testing phase.

D.

Reduced need for unexpected software changes.

Buy Now
Questions 44

Which of the following costs would be incurred in an inventory stockout?

Options:

A.

Lost sales, lost customers, and backorder.

B.

Lost sales, safety stock, and backorder.

C.

Lost customers, safety stock, and backorder.

D.

Lost sales, lost customers, and safety stock.

Buy Now
Questions 45

Which of the following engagement observations would provide the least motivation for management to amend or replace an existing cost accounting system?

Options:

A.

The distorted unit cost of a service is 50 percent lower than the true cost, while the true cost is 50 percent higher than the competition's cost.

B.

The organization is losing $1,000,000 annually because it incorrectly outsourced an operation based on information from its current system.

C.

The cost of rework, hidden by the current system, is 50 percent of the total cost of all services.

D.

50 percent of total organizational cost has been allocated on a volume basis.

Buy Now
Questions 46

Which of the following are likely indicators of ineffective change management?

1) IT management is unable to predict how a change will impact interdependent systems or business processes.

2) There have been significant increases in trouble calls or in support hours logged by programmers.

3) There is a lack of turnover in the systems support and business analyst development groups.

4) Emergency changes that bypass the normal control process frequently are deemed necessary.

Options:

A.

1 and 3 only

B.

2 and 4 only

C.

1, 2, and 4 only

D.

1, 2, 3, and 4

Buy Now
Questions 47

Which of the following attributes of data is the most significantly impacted by the internet of things?

Options:

A.

Normalization.

B.

Velocity.

C.

Structurization.

D.

Veracity.

Buy Now
Questions 48

An internal auditor computed that one of the organization's accounting divisions is processing 30 travel reports per hour while another accounting division is processing 22 travel reports per hour.

Which of the following efficiency measures did the internal auditor most likely employ?

Options:

A.

Operating rate.

B.

Asset efficiency rate.

C.

Resource utilization rate.

D.

Productivity rate.

Buy Now
Questions 49

Which of the following is a typical example of structured data?

Options:

A.

Production information maintained in relational tables.

B.

Tweets and posts of users on social media.

C.

Photos and videos stored in hard drive catalogs.

D.

Sales reports documented in word processing software.

Buy Now
Questions 50

Which of the following is a characteristic of using a hierarchical control structure?

Options:

A.

Less use of policies and procedures

B.

Less organizational commitment by employees

C.

Less emphasis on extrinsic rewards

D.

Less employees turnover

Buy Now
Questions 51

Which of me following application controls is the most dependent on the password owner?

Options:

A.

Password selection

B.

Password aging

C.

Password lockout

D.

Password rotation

Buy Now
Questions 52

A restaurant deeded to expand its business to include delivery services rather than relying on third-party food delivery services. Which of the following best describes the restaurant's strategy?

Options:

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Buy Now
Questions 53

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

Options:

A.

Rooting.

B.

Eavesdropping.

C.

Man in the middle.

D.

Session hijacking.

Buy Now
Questions 54

What would be the effect if an organization paid one of its liabilities twice during the year in error?

Options:

A.

Assets liabilities and owners' equity would be understated

B.

Assets net income and owners' equity would be unaffected

C.

Assets and liabilities would be understated

D.

Assets net income and owners' equity would be understated, but liabilities would be overstated

Buy Now
Questions 55

An organization's account for office supplies on hand had a balance of S9,000 at the end of year one. During year two. the organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?

Options:

A.

A debit to office supplies on hand for S2.500

B.

A debit to office supplies on hand for $11,500

C.

A debit to office supplies on hand for S20.500

D.

A debit to office supplies on hand for S42.500

Buy Now
Questions 56

According to HA guidance or IT which of the following spreadsheets is most likely to be considered a high-risk user-develop application?

Options:

A.

A revenue calculation spreadsheet supported with price and volume reports from the production department

B.

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions

C.

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantitates

D.

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances.

Buy Now
Questions 57

During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an analytics tool to identify the top five vendors that received the highest sum of payments.

Which of the following analytics techniques did the auditor apply?

Options:

A.

Process analysis.

B.

Process mining.

C.

Data analysis.

D.

Data mining.

Buy Now
Questions 58

Which of the following application controls verifies the accuracy of transaction results in a system?

Options:

A.

Input controls

B.

Output controls

C.

Processing controls

D.

Integrity controls

Buy Now
Questions 59

When attempting to devise creative solutions to problems, team members initially should do which of the following?

Options:

A.

Suspend assumptions and negative feedback

B.

Weight suggestions based on the speaker's level of authority.

C.

Discuss the details of all options presented

D.

Provide documentation to support their positions

Buy Now
Questions 60

Which of the following is an example of a phishing attack?

Options:

A.

An employee receives an email that appears to be from the organization's bank, though it is not. The employee replies to the email and sends the requested confidential information.

B.

An organization's website has been hacked. The hacker added political content that is not consistent with the organization's views.

C.

An organization's systems have been compromised by malicious software. The software locks the organization's operating system until d ransom is paid.

D.

An organization's communication systems have been intercepted. A communication session is controlled by an unauthorized third party.

Buy Now
Questions 61

In which of the following plans is an employee most likely to find guidance on action and performance standards?

Options:

A.

Operational plans.

B.

Tactical plans.

C.

Strategic plans.

D.

Mission plans.

Buy Now
Questions 62

Which of the following is an example of a risk avoidance response?

Options:

A.

Buying an insurance policy to protect against loss events.

B.

Hedging against natural gas price fluctuations.

C.

Selling a non-strategic business unit.

D.

Outsourcing a high risk process to a third party.

Buy Now
Questions 63

Which of the following security controls focuses most on prevention of unauthorized access to the power plant?

Options:

A.

An offboarding procedure is initiated monthly to determine redundant physical access rights

B.

Logs generated by smart locks are automatically scanned to identify anomalies in access patterns

C.

Requests for additional access rights are sent for approval and validation by direct supervisors

D.

Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours

Buy Now
Questions 64

When applied to international economics, the theory of comparative advantage proposes that total worldwide output will be greatest when:

Options:

A.

Each nation's total imports approximately equal its total exports.

B.

Each good is produced by the nation that has the lowest opportunity cost for that good.

C.

Goods that contribute to a nation's balance-of-payments deficit are no longer imported.

D.

International trade is unrestricted and tariffs are not imposed.

Buy Now
Questions 65

Which of the following statements regarding database management systems is not correct?

Options:

A.

Database management systems handle data manipulation inside the tables, rather than it being done by the operating system itself in files.

B.

The database management system acts as a layer between the application software and the operating system.

C.

Applications pass on the instructions for data manipulation which are then executed by the database

management system.

D.

The data within the database management system can only be manipulated directly by the database management system administrator.

Buy Now
Questions 66

Which of the following activities most significantly increases the risk that a bank will make poor-quality loans to its customers?

Options:

A.

Borrowers may not sign all required mortgage loan documentation.

B.

Fees paid by the borrower at the time of the loan may not be deposited in a timely manner.

C.

The bank's loan documentation may not meet the government's disclosure requirements.

D.

Loan officers may override the lending criteria established by senior management.

Buy Now
Questions 67

Where complex problems need to be addressed, which of the following communication networks would be most appropriate?

Options:

A.

Chain.

B.

All-channel.

C.

Circle.

D.

Wheel.

Buy Now
Questions 68

Which of the following statements is correct regarding risk analysis?

Options:

A.

The extent to which management judgments are required in an area could serve as a risk factor in assisting the auditor in making a comparative risk analysis.

B.

The highest risk assessment should always be assigned to the area with the largest potential loss.

C.

The highest risk assessment should always be assigned to the area with the highest probability of

occurrence.

D.

Risk analysis must be reduced to quantitative terms in order to provide meaningful comparisons across an organization.

Buy Now
Questions 69

According to the waterfall cycle approach to systems development, which of the following sequence of events is correct?

Options:

A.

Program design, system requirements, software design, analysis, coding, testing, operations.

B.

System requirements, software design, analysis, program design, testing, coding, operations.

C.

System requirements, software design, analysis, program design, coding, testing, operations.

D.

System requirements, analysis, coding, software design, program design, testing, operations.

Buy Now
Questions 70

Which of the following is a characteristic of an emerging industry?

Options:

A.

Established strategy of players.

B.

Low number of new firms.

C.

High unit costs.

D.

Technical expertise.

Buy Now
Questions 71

According to IIA guidance, which of the following corporate social responsibility (CSR) activities is appropriate for the internal audit activity to perform?

Options:

A.

Determine the optimal amount of resources for the organization to invest in CSR.

B.

Align CSR program objectives with the organization's strategic plan.

C.

Integrate CSR activities into the organization's decision-making process.

D.

Determine whether the organization has an appropriate policy governing its CSR activities.

Buy Now
Questions 72

For an engineering department with a total quality management program, important elements of quality management include all of the following except:

Options:

A.

Basing performance evaluations on the number of projects completed.

B.

Comparing results with those of other engineering departments.

C.

Creating a quality council within the engineering department.

D.

Conducting post-project surveys on performance.

Buy Now
Questions 73

An internationally recognized brand name is an entrance barrier to new competitors because new competitors would:

Options:

A.

Have to initiate a price war in order to enter the industry.

B.

Face increased production costs.

C.

Face increased marketing costs.

D.

Face higher learning costs, which would increase fixed costs.

Buy Now
Exam Code: IIA-CIA-Part3-3P
Exam Name: CIA Exam Part Three: Business Knowledge for Internal Auditing
Last Update: May 18, 2024
Questions: 488
IIA-CIA-Part3-3P pdf

IIA-CIA-Part3-3P PDF

$28  $80
IIA-CIA-Part3-3P Engine

IIA-CIA-Part3-3P Testing Engine

$33.25  $95
IIA-CIA-Part3-3P PDF + Engine

IIA-CIA-Part3-3P PDF + Testing Engine

$45.5  $130