Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

IIA-CIA-Part3 Internal Audit Function Questions and Answers

Questions 4

With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?

Options:

A.

Determining the frequency with which backups will be performed.

B.

Prioritizing the order in which business systems would be restored.

C.

Assigning who in the IT department would be involved in the recovery procedures.

D.

Assessing the resources needed to meet the data recovery objectives.

Buy Now
Questions 5

Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?

Options:

A.

Clothing company designs, makes, and sells a new item.

B.

A commercial construction company is hired to build a warehouse.

C.

A city department sets up a new firefighter training program.

D.

A manufacturing organization acquires component parts from a contracted vendor

Buy Now
Questions 6

According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?

Options:

A.

Install and update anti-virus software.

B.

Implement data encryption techniques.

C.

Set data availability by user need.

D.

Upgrade firewall configuration

Buy Now
Questions 7

Which of the following best describes meaningful recommendations for corrective actions?

Options:

A.

Recommendations that address the gap between the condition and consequence and provide at least short-term fixes

B.

Recommendations that address the gap between the criteria and condition and provide at least short-term fixes

C.

Recommendations that address the gap between the criteria and consequence and provide long-term solutions

D.

Recommendations that address the gap between the criteria and condition and provide long-term solutions

Buy Now
Questions 8

Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?

Options:

A.

Voice recognition and token

B.

Password and fingerprint

C.

Fingerprint and voice recognition

D.

Password and token

Buy Now
Questions 9

Which of the following best describes the purpose of fixed manufacturing costs?

Options:

A.

To ensure availability of production facilities.

B.

To decrease direct expenses related to production.

C.

To incur stable costs despite operating capacity.

D.

To increase the total unit cost under absorption costing

Buy Now
Questions 10

Which of the following is an established systems development methodology?

Options:

A.

Waterfall.

B.

Projects in Controlled Environments (PRINCE2).

C.

Information Technology Infrastructure Library (ITIL).

D.

COBIT

Buy Now
Questions 11

A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?

Options:

A.

Cost of sales and net income are understated.

B.

Cost of sales and net income are overstated.

C.

Cost of sales is understated and not income is overstated.

D.

Cost of sales is overstated and net Income is understated.

Buy Now
Questions 12

Which of the following controls would be most efficient to protect business data from corruption and errors?

Options:

A.

Controls to ensure data is unable to be accessed without authorization.

B.

Controls to calculate batch totals to identify an error before approval.

C.

Controls to encrypt the data so that corruption is likely ineffective.

D.

Controls to quickly identify malicious intrusion attempts.

Buy Now
Questions 13

During an internal audit engagement, it was found that several vendors were on a government sanctions list and must no longer be traded with. Which of the following would most effectively mitigate the risk of noncompliance with sanctions lists that are updated regularly?

Options:

A.

Agreements with sanctioned vendors discovered by internal audit will be placed on hold until further notice from the government

B.

A new procedure of vendor onboarding will be implemented to ensure that all new vendors undergo screenings against the sanctions list

C.

Controls will be embedded in the vendor management processes to ensure that new and existing vendors are compliant with changes to the sanctions list

D.

The legal team will be asked to prepare counter arguments to dispute audit findings and potential inquiries from the governmental authority

Buy Now
Questions 14

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?

Options:

A.

Firewall.

B.

Encryption.

C.

Antivirus.

D.

Biometrics.

Buy Now
Questions 15

A third party who provides payroll services to the organization was asked to create audit or “read-only 1 functionalities in their systems. Which of the following statements is true regarding this request?

Options:

A.

This will support execution of the right-to-audit clause.

B.

This will enforce robust risk assessment practices

C.

This will address cybersecurity considerations and concerns.

D.

This will enhance the third party's ability to apply data analytics

Buy Now
Questions 16

Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?

Options:

A.

Anti-malware software

B.

Authentication

C.

Spyware

D.

Rooting

Buy Now
Questions 17

Which of the following physical security controls is able to serve as both a detective and preventive control?

Options:

A.

Authentication logs.

B.

Card key readers.

C.

Biometric devices

D.

Video surveillance.

Buy Now
Questions 18

An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?

Options:

A.

Boundary attack.

B.

Spear phishing attack.

C.

Brute force attack.

D.

Spoofing attack.

Buy Now
Questions 19

During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?

Options:

A.

IT application-based controls

B.

IT systems development controls

C.

Environmental controls

D.

IT governance controls

Buy Now
Questions 20

Which of the following responsibilities would ordinarily fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support

B.

Management of infrastructure services, including network management

C.

Physical hosting of mainframes and distributed servers

D.

End-to-end security architecture design

Buy Now
Questions 21

An organization selected a differentiation strategy to compete at the business level. Which of the following structures best fits this strategic choice?

Options:

A.

Functional structure.

B.

Divisional structure.

C.

Mechanistic structure.

D.

Functional structure with cross-functional teams.

Buy Now
Questions 22

The internal auditor concluded there was a high likelihood that a significant wind farm development, worth $200 million, would be delayed from its approved schedule. As a result, electricity production would not start on time, leading to considerable financial penalties. Which of the following should be added to the observation to support its clarity and completeness?

Options:

A.

The effect of the observation

B.

The criteria of the observation

C.

The condition of the observation

D.

The cause of the observation

Buy Now
Questions 23

According to I1A guidance on IT. which of the following activities regarding information security Is most likely to be the responsibility of line management as opposed to executive management, internal auditors, or the board?

Options:

A.

Review and monitor security controls.

B.

Dedicate sufficient security resources.

C.

Provide oversight to the security function.

D.

Assess information control environments.

Buy Now
Questions 24

Which of the following is a typical activity performed by the help desk?

Options:

A.

Monitoring the network

B.

Troubleshooting

C.

Backing up data

D.

Assigning authorizations to a user, a role, or profile

Buy Now
Questions 25

Which of the following is most influenced by a retained earnings policy?

Options:

A.

Cash.

B.

Dividends.

C.

Gross margin.

D.

Net income.

Buy Now
Questions 26

Which of the following is an example of a physical control?

Options:

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization's critical data

Buy Now
Questions 27

After auditing the treasury function, the internal audit team issued a final report, which included an action plan agreed with management. When the audit team returned three months later to follow up on the action plan, management indicated that the plan had not been implemented because the old treasury system was being replaced with a new system. Which of the following is the most appropriate audit response?

Options:

A.

The internal audit team should propose a new, relevant action plan that takes into account the new treasury system

B.

The internal audit team should disregard the original action plan and follow up next year, after management determines whether the new system poses any new risks

C.

The internal audit team should report this issue to the chief audit executive, who should communicate management's noncompliance directly to the board

D.

The internal audit team should report this issue to the chief audit executive, who should discuss the issue with senior management

Buy Now
Questions 28

Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?

Options:

A.

Cost method.

B.

Equity method .

C.

Consolidation method.

D.

Fair value method.

Buy Now
Questions 29

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange (EDI)?

Options:

A.

A just-in-time purchasing environment

B.

A large volume of custom purchases

C.

A variable volume sensitive to material cost

D.

A currently inefficient purchasing process

Buy Now
Questions 30

What is the primary purpose of an integrity control?

Options:

A.

To ensure data processing is complete, accurate, and authorized

B.

To ensure data being processed remains consistent and intact

C.

To monitor the effectiveness of other controls

D.

To ensure the output aligns with the intended result

Buy Now
Questions 31

Which of the following best describes depreciation?

Options:

A.

It is a process of allocating cost of assets between periods.

B.

It is a process of assets valuation.

C.

It is a process of accumulating adequate funds to replace assets.

D.

It is a process of measuring decline in the value of assets because of obsolescence

Buy Now
Questions 32

Which of the following best explains why an organization would enter into a capital lease contract?

Options:

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization's free cash flow from operations

C.

To Improve the organization's free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Buy Now
Questions 33

Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and

telecommunications, but does not have servers or infrastructure equipment?

Options:

A.

Frozen site

B.

Cold site

C.

Warm site

D.

Hot site

Buy Now
Questions 34

Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?

Options:

A.

Articulation of the data

B.

Availability of the data.

C.

Measurability of the data

D.

Relevance of the data.

Buy Now
Questions 35

The internal audit function is instructed by the audit committee to assess and give an opinion annually on risk management process effectiveness. However, lacking in-house expertise, the chief audit executive (CAE) initially appoints an independent consultant to assist with this engagement. Which of the following approaches is the most appropriate?

Options:

A.

The engagement is wholly performed by the independent consultant and the CAE forms the opinion

B.

The independent consultant accomplishes the entire engagement and forms the opinion

C.

Internal auditors work with the independent consultant and the CAE forms the opinion

D.

Internal auditors carry out the entire engagement and the independent consultant forms the opinion

Buy Now
Questions 36

Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?

Options:

A.

Analysis of the full population of existing data.

B.

Verification of the completeness and integrity of existing data.

C.

Continuous monitoring on a repetitive basis.

D.

Analysis of the databases of partners, such as suppliers.

Buy Now
Questions 37

What is the primary risk associated with an organization adopting a decentralized structure?

Options:

A.

Inability to adapt.

B.

Greater costs of control function.

C.

Inconsistency in decision making.

D.

Lack of resilience.

Buy Now
Questions 38

Which of the following is a key performance indicator of the efficiency of the internal audit function?

Options:

A.

The number of audits completed

B.

The number of significant audit observations

C.

The percentage of recommendations implemented

D.

The number of training hours per auditor

Buy Now
Questions 39

The chief audit executive (CAE) and management of the area under review disagree over managing a significant risk item. According to IIA guidance, which of the following actions should the CAE take first?

Options:

A.

Refer the matter to the board for resolution

B.

Consult the approved audit charter on supremacy of internal auditors’ decisions

C.

Record management’s and the internal auditor's positions in the audit report

D.

Discuss the issue in question further with senior management

Buy Now
Questions 40

Which of the following should the chief audit executive agree upon with the board before starting an external assessment of the internal audit function?

Options:

A.

The audit areas that should be reviewed

B.

The level of testing that will be required

C.

The qualifications needed on the external assessment team

D.

The specialized skills that each external assessment team member needs

Buy Now
Questions 41

According to IIA guidance, which of the following statements is true regarding the chief audit executive's (CAE’s) responsibility for following up on management action plans?

Options:

A.

Follow-up activities must be performed on an ongoing basis, such as quarterly, rather than being scheduled as specific assignments in the internal audit plan

B.

The primary purpose of the CAE’s follow-up activities is to verify whether the audit issues raised in the audit report are valid

C.

The CAE may plan follow-up activities on a selective basis, depending on risk significance, to verify whether management action plans were completed

D.

Where management believes certain action plans are no longer necessary, the CAE must resolve the matter with the board and if the matter remains unresolved, communicate to senior management

Buy Now
Questions 42

An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC

resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?

Options:

A.

The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.

B.

Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.

C.

Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.

D.

Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.

Buy Now
Questions 43

Which of the following IT layers would require the organization to maintain communication with a vendor in a tightly controlled and monitored manner?

Options:

A.

Applications

B.

Technical infrastructure.

C.

External connections.

D.

IT management

Buy Now
Questions 44

Which of the following is a disadvantage in a centralized organizational structure?

Options:

A.

Communication conflicts

B.

Slower decision making.

C.

Loss of economies of scale

D.

Vulnerabilities in sharing knowledge

Buy Now
Questions 45

Which of the following is an indicator of liquidity that is more dependable than working capital?

Options:

A.

Acid-test (quick) ratio

B.

Average collection period

C.

Current ratio.

D.

Inventory turnover.

Buy Now
Questions 46

Which of the following IT-related activities is most commonly performed by the second line of defense?

Options:

A.

Block unauthorized traffic.

B.

Encrypt data.

C.

Review disaster recovery test results.

D.

Provide an independent assessment of IT security.

Buy Now
Questions 47

Which of the following best explains why an organization would enter into a capital lease contract?

Options:

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization’s free cash flow from operations

C.

To improve the organization’s free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Buy Now
Questions 48

During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?

Options:

A.

The maximum tolerable downtime after the occurrence of an incident.

B.

The maximum tolerable data loss after the occurrence of an incident.

C.

The maximum tolerable risk related to the occurrence of an incident

D.

The minimum recovery resources needed after the occurrence of an incident

Buy Now
Questions 49

Which of the following best describes a transformational leader, as opposed to a transactional leader?

Options:

A.

The leader searches for deviations from the rules and standards and intervenes when deviations exist.

B.

The leader intervenes only when performance standards are not met.

C.

The leader intervenes to communicate high expectations.

D.

The leader does not intervene to promote problem-solving

Buy Now
Questions 50

Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?

Options:

A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Buy Now
Questions 51

An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?

Options:

A.

Designing and maintaining the database.

B.

Preparing input data and maintaining the database.

C.

Maintaining the database and providing its security,

D.

Designing the database and providing its security

Buy Now
Questions 52

A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25.000 shirts. Actual sales total S300.000. What is margin of safety sales for the company?

Options:

A.

$100.000

B.

$200,000

C.

$275,000

D.

$500,000

Buy Now
Questions 53

An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?

Options:

A.

$0

B.

$4,000

C.

$5,000

D.

$10,000

Buy Now
Questions 54

Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?

Options:

A.

Income statement.

B.

Owner's equity statement.

C.

Balance sheet.

D.

Statement of cash flows.

Buy Now
Questions 55

According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?

Options:

A.

Project portfolio.

B.

Project development

C.

Project governance.

D.

Project management methodologies

Buy Now
Questions 56

An organization produces products X and Y. The materials used for the production of both products are limited to 500 Kilograms

(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows in order to maximize profit, how much of product Y should the organization produce each month?

$10 $13

2 kg

70 units

6 kg

120 units

Options:

A.

50 units

B.

60 units

C.

70 units

D.

1:20 units

Buy Now
Questions 57

What is the primary purpose of data and systems backup?

Options:

A.

To restore all data and systems immediately after the occurrence of an incident.

B.

To set the maximum allowable downtime to restore systems and data after the occurrence of an incident.

C.

To set the point in time to which systems and data must be recovered after the occurrence of an incident.

D.

To restore data and systems to a previous point in time after the occurrence of an incident

Buy Now
Questions 58

Which of the following key performance indicators would serve as the best measurement of internal audit innovation?

Options:

A.

The number of scheduled and completed audits and percentage of substantial recommendations

B.

The board’s satisfaction index and internal audit staff commitment ratings

C.

Internal audit staff’s application of technology in audit fieldwork and participation in professional organizations and publications

D.

Internal audit staff’s compliance with the audit manual and technical knowledge in auditing, information security, and cloud computing issues

Buy Now
Questions 59

If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?

Options:

A.

Settlement of short-term obligations may become difficult.

B.

Cash may be bed up in items not generating financial value.

C.

Collection policies of the organization are ineffective.

D.

The organization is efficient in using assets to generate revenue.

Buy Now
Questions 60

Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?

Options:

A.

Risk tolerance

B.

Performance

C.

Threats and opportunities

D.

Governance

Buy Now
Questions 61

Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?

Options:

A.

Theory of constraints.

B.

Just-in-time method.

C.

Activity-based costing.

D.

Break-even analysis

Buy Now
Questions 62

A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?

Options:

A.

Lack of coordination among different business units

B.

Operational decisions are inconsistent with organizational goals

C.

Suboptimal decision-making

D.

Duplication of business activities

Buy Now
Questions 63

Which of the following security controls would be me most effective in preventing security breaches?

Options:

A.

Approval of identity request

B.

Access logging.

C.

Monitoring privileged accounts

D.

Audit of access rights

Buy Now
Questions 64

Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?

Options:

A.

Periodic assessments

B.

Ongoing monitoring

C.

Full external assessments

D.

Self-Assessment with Independent Validation (SAIV)

Buy Now
Questions 65

Which of the following describes how human resources can best assist in recruitment efforts for the internal audit function?

Options:

A.

Prepare competency-based interview questions and interview potential candidates

B.

Leverage the organization's intranet and recruiting agencies to search for potential candidates

C.

Forward all applications to the chief audit executive for review

D.

Select the most qualified candidate for the vacant position

Buy Now
Questions 66

An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?

Options:

A.

The organization's operating expenses are increasing.

B.

The organization has adopted just-in-time inventory.

C.

The organization is experiencing Inventory theft

D.

The organization's inventory is overstated.

Buy Now
Questions 67

On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?

Options:

A.

It should be reported as an administrative expense on the income statement.

B.

It should be reported as period cost other than a product cost on the management accounts

C.

It should be reported as cost of goods sold on the income statement.

D.

It should be reported on the balance sheet as part of inventory.

Buy Now
Questions 68

Internal audit observed an increase in defects of newly installed spare parts. An investigation revealed that vendors delivered spare parts of worse quality than required by contract. Which of the following recommendations would most helpfully mitigate this risk?

Options:

A.

Add higher level managers to invoice approval process

B.

Request quality-related confirmations from vendors

C.

Conduct random inspections and testing of deliveries

D.

Improve technical specifications of procurement documents

Buy Now
Questions 69

Which of the following application controls, implemented by management, monitors data being processed to ensure the data remains consistent and accurate?

Options:

A.

Management trail controls

B.

Output controls.

C.

Integrity controls

D.

input controls

Buy Now
Questions 70

Which of the following situations best applies to an organization that uses a project, rather than a process, to accomplish its business activities?

Options:

A.

A clothing company designs, makes, and sells a new item

B.

A commercial construction company is hired to build a warehouse

C.

A city department sets up a new firefighter training program

D.

A manufacturing organization acquires component parts from a contracted vendor

Buy Now
Questions 71

When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?

Options:

A.

Activity

B.

Subprocess

C.

Major process

D.

Mega process

Buy Now
Questions 72

According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?

Options:

A.

HTTP sites provide sufficient security to protect customers' credit card information.

B.

Web servers store credit cardholders' information submitted for payment.

C.

Database servers send cardholders’ information for authorization in clear text.

D.

Payment gatewaysauthorizecredit cardonlinepayments.

Buy Now
Questions 73

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?

Options:

A.

Not installing anti-malware software

B.

Updating operating software in a haphazard manner,

C.

Applying a weak password for access to a mobile device.

D.

JoIIbreaking a locked smart device

Buy Now
Questions 74

An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?

Options:

A.

Horizontal analysis

B.

Vertical analysis

C.

Ratio analysis

D.

Trend analysis

Buy Now
Questions 75

Given the information below, which organization is in the weakest position to pay short-term debts?

Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000

Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000

Organization C: Current assets constitute $900,000; Current liabilities are $300,000

Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000

Options:

A.

Organization A

B.

Organization B

C.

Organization C

D.

Organization D

Buy Now
Questions 76

At which fundamental level of a quality assurance and improvement program is an opinion expressed about the entire spectrum of the internal audit function’s work?

Options:

A.

At the external perspective level

B.

At the internal audit function level

C.

At the internal audit engagement level

D.

At the self-assessment activity level

Buy Now
Questions 77

In an organization with a poor control environment, which of the following indicators would help an internal audit function measure its ability to provide risk-based assurance?

Options:

A.

The value of potential cost savings, or prevented losses, identified per year

B.

The percentage of observations that can be linked to significant organizational risks

C.

The extent of data mining or data analytics used during assurance engagements

D.

The amount of time dedicated to organization-wide risk assessments

Buy Now
Questions 78

Which of the following backup methodologies would be most efficient in backing up a database in the production environment?

Options:

A.

Disk mirroring of the data being stored on the database.

B.

A differential backup that is performed on a weekly basis.

C.

An array of independent disks used to back up the database.

D.

An incremental backup of the database on a daily basis.

Buy Now
Questions 79

An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?

Options:

A.

26 days.

B.

90 days.

C.

100 days.

D.

110 days.

Buy Now
Questions 80

Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?

Options:

A.

Warm site recovery plan.

B.

Hot site recovery plan.

C.

Cool site recovery plan.

D.

Cold site recovery plan.

Buy Now
Questions 81

An internal audit function did not conform with the Global Internal Audit Standards in only one of many engagements, as the engagement was performed with a lack of adequate knowledge of the subject matter. Which of the following is appropriate in relation to declaring conformance with the Standards?

Options:

A.

The internal audit function can still declare conformance with the Standards for all engagements

B.

The internal audit function can still declare conformance with the Standards for all other engagements that satisfy the requirements

C.

The internal audit function can declare partial conformance with the Standards for all engagements

D.

The internal audit function needs to evaluate the impact of the nonconformance before it can declare nonconformance with the Standards

Buy Now
Questions 82

Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?

Options:

A.

Gain sharing

B.

Commission

C.

Profit sharing

D.

Pension

Buy Now
Questions 83

Which of the following security controls would be appropriate to protect the exchange of information?

Options:

A.

Firewalls.

B.

Activity logs.

C.

Antivirus software.

D.

File encryption.

Buy Now
Questions 84

Which of the following statements is accurate when planning for an external quality assurance assessment of the internal audit function?

Options:

A.

The external assessment would include the audit function’s compliance with laws and regulations

B.

The selected qualified assessor can be from the organization’s shared services team

C.

The external assessment team members must work for an accounting firm

D.

The frequency of the performance of assessments should be considered by the assessor

Buy Now
Questions 85

Which of the following items best describes the strategy of outsourcing?

Options:

A.

Contracting the work to Foreign Service providers to obtain lower costs

B.

Contracting functions or knowledge-related work with an external service provider.

C.

Contract -ng operation of some business functions with an internal service provider

D.

Contracting a specific external service provider to work with an internal service provider

Buy Now
Questions 86

An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?

Options:

A.

Use of a central processing unit

B.

Use of a database management system

C.

Use of a local area network

D.

Use of electronic data Interchange

Buy Now
Questions 87

Which of the following is required in effective IT change management?

Options:

A.

The sole responsibility for change management is assigned to an experienced and competent IT team

B.

Change management follows a consistent process and is done in a controlled environment.

C.

Internal audit participates in the implementation of change management throughout the organisation.

D.

All changes to systems must be approved by the highest level of authority within an organization.

Buy Now
Questions 88

An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?

Options:

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing she financial information of the company

Buy Now
Questions 89

A company produces water buckets with the following costs per bucket:

Direct labor = 82

Direct material = $5

Fixed manufacturing = 83.50

Variable manufacturing = 82.50

The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.

Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?

Options:

A.

$9.50

B.

$10.50

C.

$11

D.

$13

Buy Now
Questions 90

When using data analytics during a review of the procurement process, what is the first step in the analysis process?

Options:

A.

Identify data anomalies and outliers

B.

Define questions to be answered

C.

Identify data sources available

D.

Determine the scope of the data extract

Buy Now
Questions 91

In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?

Options:

A.

Input controls

B.

Segregation of duties

C.

Physical controls

D.

Integrity controls

Buy Now
Questions 92

The engagement supervisor prepares the final engagement communication for dissemination. Since the chief audit executive (CAE) is on leave, the supervisor is delegated to disseminate the final engagement communication to all relevant parties. Who should be accountable for the final engagement communication?

Options:

A.

Engagement supervisor

B.

Chief audit executive

C.

The board

D.

The internal audit team

Buy Now
Questions 93

An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?

Options:

A.

Estimate time required to complete the whole project.

B.

Determine the responses to expected project risks.

C.

Break the project into manageable components.

D.

Identify resources needed to complete the project

Buy Now
Questions 94

Which of the following statements is true regarding data backup?

Options:

A.

System backups should always be performed in real-time.

B.

Backups should be stored in a secured location onsite for easy access.

C.

The tape rotation schedule affects how long data is retained.

D.

Backup media should be restored only in case of a hardware or software failure.

Buy Now
Questions 95

Which of the following measures the operating success of a company for a given period of time?

Options:

A.

Liquidity ratios.

B.

Profitability ratios.

C.

Solvency ratios.

D.

Current ratios.

Buy Now
Questions 96

Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.

Requested backup tapes were not returned from the offsite vendor In a timely manner.

B.

Returned backup tapes from the offsite vendor contained empty spaces.

C.

Critical systems have boon backed up more frequently than required.

D.

Critical system backup tapes are taken off site less frequently than required

Buy Now
Questions 97

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

Options:

A.

An extranet.

B.

A local area network (LAN).

C.

An intranet.

D.

The internet.

Buy Now
Questions 98

Which of the following lists best describes the classification of manufacturing costs?

Options:

A.

Direct materials, indirect materials, raw materials.

B.

Overhead costs, direct labor, direct materials.

C.

Direct materials, direct labor, depreciation on factory buildings.

D.

Raw materials, factory employees' wages, production selling expenses.

Buy Now
Questions 99

Which of the following represents an example of a physical security control?

Options:

A.

Access rights are allocated according to the organization’s policy

B.

There is confirmation that data output is accurate and complete

C.

Servers are located in locked rooms to which access is restricted

D.

A record is maintained to track the process from data input to storage

Buy Now
Questions 100

Which of the following best describes a man-in-the-middle cyber-attack?

Options:

A.

The perpetrator is able to delete data on the network without physical access to the device.

B.

The perpetrator is able to exploit network activities for unapproved purposes.

C.

The perpetrator is able to take over control of data communication in transit and replace traffic.

D.

The perpetrator is able to disable default security controls and introduce additional vulnerabilities

Buy Now
Questions 101

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

Favorable labor efficiency variance

Adverse labor rate variance

Adverse labor efficiency variance

Favorable labor rate variance

Options:

A.

1 and 2.

B.

1 and 4.

C.

3 and 4.

D.

2 and 3.

Buy Now
Questions 102

Which of the following is used during all three stages of project management?

Options:

A.

Earned Value Management (EVM).

B.

Organizational procedures.

C.

Performance measurement.

D.

Project Management Information System (PMIS).

Buy Now
Questions 103

Which of the following is most appropriate for the chief audit executive to keep in mind when establishing policies and procedures to guide the internal audit function?

Options:

A.

The nature of the internal audit function

B.

The size of the organization

C.

The size and maturity of the internal audit function

D.

The structure of the organization

Buy Now
Questions 104

According to IIA guidance, which of the following statements is true regarding analytical procedures?

Options:

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify differences, but cannot be used to identify the absence of differences

Buy Now
Questions 105

Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?

Options:

A.

Measure product performance against an established standard.

B.

Develop standard methods for performing established activities.

C.

Require the grouping of activities under a single manager.

D.

Assign each employee a reasonable workload.

Buy Now
Questions 106

Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?

Options:

A.

Nondisclosure agreements between the firm and its employees.

B.

Logs of user activity within the information system.

C.

Two-factor authentication for access into the information system.

D.

limited access so information, based on employee duties

Buy Now
Questions 107

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?

Options:

A.

Boundary defense

B.

Malware defense.

C.

Penetration tests

D.

Wireless access controls

Buy Now
Questions 108

Which of the following is the most appropriate way to record each partner’s initial investment in a partnership?

Options:

A.

At the value agreed upon by the partners

B.

At book value

C.

At fair value

D.

At the original cost

Buy Now
Questions 109

According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?

Options:

A.

Salary and status.

B.

Responsibility and advancement.

C.

Work conditions and security.

D.

Peer relationships and personal life.

Buy Now
Questions 110

Which of the following communication characteristics is achieved when the internal audit function avoids redundancies and excludes information that is unnecessary, insignificant, or unrelated to the engagement?

Options:

A.

Constructive communications

B.

Complete communications

C.

Concise communications

D.

Clear communications

Buy Now
Questions 111

Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?

Options:

A.

UDAs arid traditional JT applications typically follow a similar development life cycle

B.

A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.

C.

Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.

D.

IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.

Buy Now
Questions 112

How do data analysis technologies affect internal audit testing?

Options:

A.

They improve the effectiveness of spot check testing techniques.

B.

They allow greater insight into high risk areas.

C.

They reduce the overall scope of the audit engagement,

D.

They increase the internal auditor's objectivity.

Buy Now
Questions 113

Which of the following are the most common characteristics of big data?

Options:

A.

Visibility, validity, vulnerability

B.

Velocity, variety, volume

C.

Complexity, completeness, constancy

D.

Continuity, control, convenience

Buy Now
Questions 114

Which of the following statements is true regarding cost-volume-profit analysis?

Options:

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted

B.

Breakeven is the amount of units sold to cover variable costs

C.

Breakeven occurs when the contribution margin covers fixed costs

D.

Following breakeven, net operating income will increase by the excess of fixed costs less the variable costs per unit sold

Buy Now
Questions 115

Which of the following principles s shared by both hierarchies and open organizational structures?

1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.

2. A supervisor's span of control should not exceed seven subordinates.

3. Responsibility should be accompanied by adequate authority.

4. Employees at all levels should be empowered to make decisions.

Options:

A.

1 and 3 only

B.

1 and 4 only

C.

2 and 3 only

D.

3 and 4 only

Buy Now
Questions 116

Which of the following best describes the chief audit executive's responsibility for assessing the organization's residual risk?

Options:

A.

Create an action plan to mitigate the risk

B.

Incorporate management acceptance of risk in the workpapers as internal audit evidence

C.

Report deviations immediately to the board

D.

Communicate the matter with senior management

Buy Now
Questions 117

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

Options:

A.

Rooting.

B.

Eavesdropping.

C.

Man in the middle.

D.

Session hijacking.

Buy Now
Questions 118

An organization uses the management-by-objectives method, whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?

Options:

A.

It is particularly helpful to management when the organization is facing rapid change

B.

It is a more successful approach when adopted by mechanistic organizations

C.

It is more successful when goal-setting is performed not only by management, but by all team members, including lower-level staff

D.

It is particularly successful in environments that are prone to having poor employer-employee relations

Buy Now
Questions 119

A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?

Options:

A.

Readiness assessment.

B.

Project risk assessment.

C.

Post-implementation review.

D.

Key phase review.

Buy Now
Questions 120

A motivational technique generally used to overcome monotony and job-related boredom is:

Options:

A.

Job specification.

B.

Job objectives.

C.

Job rotation.

D.

Job description.

Buy Now
Questions 121

Which of the following statements. Is most accurate concerning the management and audit of a web server?

Options:

A.

The file transfer protocol (FTP) should always be enabled.

B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.

C.

The number of ports and protocols allowed to access the web server should be maximized.

D.

Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.

Buy Now
Questions 122

What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical products across all of its markets?

Options:

A.

Export strategy.

B.

Transnational strategy.

C.

Multi-domestic strategy.

D.

Globalization strategy.

Buy Now
Questions 123

In accounting, which of the following statements is true regarding the terms debit and credit?

Options:

A.

Debit indicates the right side of an account and credit the left side

B.

Debit means an increase in an account and credit means a decrease.

C.

Credit indicates the right side of an account and debit the left side.

D.

Credit means an increase in an account and debit means a decrease

Buy Now
Questions 124

Which of the following Issues would be a major concern for internal auditors when using a free software to analyze a third-party vendor's big data?

Options:

A.

The ability to use the software with ease to perform the data analysis to meet the engagement objectives.

B.

The ability to purchase upgraded features of the software that allow for more In-depth analysis of the big data.

C.

The ability to ensure that big data entered into the software is secure from potential compromises or loss.

D.

The ability to download the software onto the appropriate computers for use in analyzing the big data.

Buy Now
Questions 125

According to Maslow's hierarchy of needs theory, which of the following would likely have the most impact on retaining staff, if their lower-level needs are already met?

Options:

A.

Social benefits.

B.

Compensation.

C.

Job safety.

D.

Recognition

Buy Now
Questions 126

An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?

Options:

A.

Required documentation of process for discontinuing use of the devices

B.

Required removal of personal pictures and contacts.

C.

Required documentation of expiration of contract with service provider.

D.

Required sign-off on conflict of interest statement.

Buy Now
Questions 127

An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?

Options:

A.

he organization's operating expenses are increasing.

B.

The organization has adopted just-in-time inventory.

C.

The organization is experiencing inventory theft.

D.

The organization's inventory is overstated.

Buy Now
Questions 128

An internal audit team performed an assurance engagement of the organization's IT security. The audit team found significant flaws in the design and implementation of the internal control framework. IT department managers often disagreed with the audit team on the significance of the findings, claiming that the controls in place partly mitigated the risks. Which of the following should be included when communicating the engagement results to senior management?

Options:

A.

All the correspondence exchanged between the audit team and IT department demonstrating the disagreement

B.

The audit team's findings and the IT department’s opinion

C.

Only the audit team's findings and the reasons they require immediate action from senior management

D.

Only the findings that were agreed upon between the audit team and the IT department

Buy Now
Questions 129

An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?

Options:

A.

Decrease the transfer price.

B.

Increase the transfer price.

C.

Charge at the arm’s length price.

D.

Charge at the optimal transfer price.

Buy Now
Questions 130

After identifying and reporting a control deficiency, which of the following actions should an internal auditor perform next?

Options:

A.

Ensure full documentation of the control deficiency and close out the audit file

B.

Follow up on the remediation status with business management periodically

C.

Note this control area “audited” and mark it as out-of-scope for the following year

D.

Design a remediation plan and ensure operational management follows through

Buy Now
Questions 131

An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?

Options:

A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.

B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process.

C.

Institute detection and authentication controls for all devices used for network connectivity and data storage.

D.

Use management software scan and then prompt parch reminders when devices connect to the network

Buy Now
Questions 132

Which of the following would be a concern related to the authorization controls utilized for a system?

Options:

A.

Users can only see certain screens in the system.

B.

Users are making frequent password change requests.

C.

Users Input Incorrect passwords and get denied system access

D.

Users are all permitted uniform access to the system.

Buy Now
Questions 133

Which of the following statements depicts a valid role of the internal audit function in ensuring the effectiveness of management action plans?

Options:

A.

Internal audit should not be involved in the design, implementation, or monitoring of management action plans in order to maintain independence and objectivity

B.

Internal audit supports the board in the design, implementation, and monitoring of effective management action plans

C.

Internal audit collaborates with management to evaluate whether the management action plans remediate audit observations effectively

D.

Internal audit designs the action plans and ensures that management implements them effectively

Buy Now
Questions 134

Which of the following is true of matrix organizations?

Options:

A.

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.

B.

A combination of product and functional departments allows management to utilize personnel from various functions.

C.

Authority, responsibility, and accountability of the units involved may vary based on the project's life or the organization's culture.

D.

It is best suited for firms with scattered locations or for multi-line, large-scale firms.

Buy Now
Questions 135

Which of the following physical access controls is most likely to be based on the "something you have" concept?

Options:

A.

A retina characteristics reader.

B.

A PIN code reader.

C.

A card-key scanner.

D.

A fingerprint scanner.

Buy Now
Questions 136

Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?

Options:

A.

Greater cost-effectiveness

B.

Increased economies of scale

C.

Larger talent pool

D.

Strong internal controls

Buy Now
Questions 137

While conducting an audit of the accounts payable department, an internal auditor found that 3% of payments made during the period under review did not agree with the submitted invoices. Which of the following key performance indicators (KPIs) for the department would best assist the auditor in determining the significance of the test results?

Options:

A.

A KPI that defines the process owner's tolerance for performance deviations.

B.

A KPI that defines the importance of performance levels and disbursement statistics being measured.

C.

A KPI that defines timeliness with regard to reporting disbursement data errors to authorized personnel.

D.

A KPI that defines operating ratio objectives of the disbursement process.

Buy Now
Questions 138

Which of the following is an example of a key systems development control typically found in the in-house development of an application system?

Options:

A.

Logical access controls monitor application usage and generate audit trails.

B.

The development process is designed to prevent, detect, and correct errors that may occur.

C.

A record is maintained to track the process of data from input, to output, to storage.

D.

Business users' requirements are documented, and their achievement is monitored.

Buy Now
Questions 139

Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?

Options:

A.

There is a greater need for organizations to rely on users to comply with policies and procedures.

B.

With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.

C.

Incident response times are less critical in the BYOD environment compared to a traditional environment.

D.

There is greater sharing of operational risk in a BYOD environment.

Buy Now
Questions 140

Which of the following would most likely be found in an organization that uses a decentralized organizational structure?

Options:

A.

There is a higher reliance on organizational culture.

B.

There are clear expectations set for employees.

C.

There are electronic monitoring techniques employed.

D.

There is a defined code for employee behavior.

Buy Now
Questions 141

Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

Options:

A.

High-yield bonds

B.

Commodity-backed bonds

C.

Zero-coupon bonds

D.

Junk bonds

Buy Now
Questions 142

Which statement is true regarding the development of a risk-based internal audit plan?

Options:

A.

It requires a previously conducted assurance engagement on the organization’s risk management maturity

B.

It requires an assessment by the internal audit function of key risks identified within the organization's risk management system

C.

It requires that at least 90% of planned engagements address areas critical to the organization's strategy

D.

It requires that an organization adheres to a well-recognized risk management framework in order to identify and manage its risks

Buy Now
Questions 143

When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?

Options:

A.

Identification of achievable goals and timelines

B.

Analysis of the competitive environment.

C.

Plan for the procurement of resources

D.

Plan for progress reporting and oversight.

Buy Now
Questions 144

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

Options:

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity

Buy Now
Questions 145

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

Options:

A.

An extranet

B.

A local area network

C.

An Intranet

D.

The internet

Buy Now
Questions 146

According to IIA guidance, which of the following are typical physical and environmental IT controls?

Options:

A.

Locating servers in locked rooms with restricted admission.

B.

Applying encryption where confidentiality is a stated requirement.

C.

Allocating and controlling access rights according to the organization's stated policy.

D.

Ensuring a tightly controlled process for applying all changes and patches to software, systems, network components, and data.

Buy Now
Questions 147

Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?

Options:

A.

The term describes budgets that exclude fixed costs.

B.

Flexible budgets exclude outcome projections, which are hard to determine, and instead rely on the most recent actual outcomes.

C.

The term is a red flag for weak budgetary control activities.

D.

Flexible budgets project data for different levels of activity.

Buy Now
Questions 148

During a routine bank branch audit, the internal audit function observed that the sole security guard at the branch only worked part time. The chief audit executive (CAE) believed that this increased the risk of loss of property and life in the event of a robbery. The branch security manager informed the CAE that a full-time guard was not needed because the branch was in close proximity to a police station. Still, the CAE found this to be an unacceptable risk due to the recent increase in robberies in that area. Which of the following is the most appropriate next step for the CAE to take?

Options:

A.

Immediately report the issue to the board to ensure timely corrective actions are taken to resolve the risk

B.

Continue discussions with the security manager until he is persuaded and agrees to increase branch security

C.

Document the security manager’s decision to accept the risk in the audit workpapers

D.

Escalate the issue to the bank’s chief security officer to determine acceptability of the risk

Buy Now
Questions 149

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

Options:

A.

Session hijacking.

B.

Jailbreaking

C.

Eavesdropping,

D.

Authentication.

Buy Now
Questions 150

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?

Options:

A.

Phishing.

B.

Ransomware.

C.

Hacking.

D.

Makvare

Buy Now
Questions 151

Which of the following is considered a physical security control?

Options:

A.

Transaction logs are maintained to capture a history of system processing.

B.

System security settings require the use of strong passwords and access controls.

C.

Failed system login attempts are recorded and analyzed to identify potential security incidents.

D.

System servers are secured by locking mechanisms with access granted to specific individuals.

Buy Now
Questions 152

Which of the following statements Is true regarding the use of centralized authority to govern an organization?

Options:

A.

Fraud committed through collusion is more likely when authority is centralized.

B.

Centralized managerial authority typically enhances certainty and consistency within an organization.

C.

When authority is centralized, the alignment of activities to achieve business goals typically is decreased.

D.

Using separation of duties to mitigate collusion is reduced only when authority is centralized.

Buy Now
Questions 153

An internal auditor discusses user-defined default passwords with the database administrator. Such passwords will be reset as soon as the user logs in for the first time, but the initial value of the password is set as "123456." Which of the following are the auditor and the database administrator most likely discussing in this situation?

Options:

A.

Whether it would be more secure to replace numeric values with characters.

B.

What happens in the situations where users continue using the initial password.

C.

What happens in the period between the creation of the account and the password change.

D.

Whether users should be trained on password management features and requirements.

Buy Now
Questions 154

With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?

Options:

A.

Inventory of information assets

B.

Limited sharing of data files with external parties.

C.

Vulnerability assessment

D.

Clearly defined policies

Buy Now
Exam Code: IIA-CIA-Part3
Exam Name: Internal Audit Function
Last Update: Feb 21, 2026
Questions: 514
IIA-CIA-Part3 pdf

IIA-CIA-Part3 PDF

$25.5  $84.99
IIA-CIA-Part3 Engine

IIA-CIA-Part3 Testing Engine

$30  $99.99
IIA-CIA-Part3 PDF + Engine

IIA-CIA-Part3 PDF + Testing Engine

$40.5  $134.99