An organization's board of directors is particularly focused on positioning, the organization as a leader in the industry and beating the competition. Which of the following strategies offers the greatest alignment with the board's focus?
Which of the following principles s shared by both hierarchies and open organizational structures?
1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. Employees at all levels should be empowered to make decisions.
An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?
Management is pondering the following question:
"How does our organization compete?"
This question pertains to which of the following levels of strategy?
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
Which of the following attributes of data is the most significantly impacted by the internet of things?
Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (lAArs) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA. Which of the following staffing approaches is the CAE most likely lo select?
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
Which of these instances accurately describes the responsibilities for big data governance?
An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?
An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?
Which of the following capital budgeting techniques considers the expected total net cash flows from investment?
An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?
Which of the following physical security controls is able to serve as both a detective and preventive control?
An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?
Which of the following storage options would give the organization the best chance of recovering data?
The internal auditor concluded there was a high likelihood that a significant wind farm development, worth $200 million, would be delayed from its approved schedule. As a result, electricity production would not start on time, leading to considerable financial penalties. Which of the following should be added to the observation to support its clarity and completeness?
An organization contracted a third-party service provider to plan, design, and build a new facility. Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?
Which of the following physical access controls often functions as both a preventive and detective control?
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?
A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?
An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?
At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?
Which of the following statements distinguishes a router from a typical switch?
A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?
Which of the following would be the best method to collect information about employees' job satisfaction?
A third party who provides payroll services to the organization was asked to create audit or “read-only 1 functionalities in their systems. Which of the following statements is true regarding this request?
An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?
The management of working capital is most crucial for which of the following aspects of business?
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?
Which of the following statements best describes the current state of data privacy regulation?
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?
The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recovery solution?
A newly appointed chief audit executive (CAE) reviews current reporting practices. The CAE notices that exit meetings tend to be unproductive. When internal auditors present summaries of observations, engagement clients consistently complain that they do not understand where the observations come from. Which of the following could improve this situation?
According to Maslow’s hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?
With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?
Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?
According to IIA guidance, which of the following are typical physical and environmental IT controls?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?
An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?
Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?
Which of the following principles is shared by both hierarchical and open organizational structures?
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A supervisor's span of control should not exceed seven subordinates.
Responsibility should be accompanied by adequate authority.
Employees at all levels should be empowered to make decisions.
According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
Which of the following IT-related activities is most commonly performed by the second line of defense?
With regard to project management, which of the following statements about project crashing is true?
Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?
An internal auditor is assessing the risks related to an organization’s mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal auditor be most concerned about?
Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?
Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?
For employees, the primary value of implementing job enrichment is which of the following?
An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?
A new manager received computations of the internal rate of return regarding his project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
Which of the following best describes the purpose of fixed manufacturing costs?
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Which of the following statements. Is most accurate concerning the management and audit of a web server?
An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?
Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
1. Favorable labor efficiency variance.
2. Adverse labor rate variance.
3. Adverse labor efficiency variance.
4. Favorable labor rate variance.
An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
Which of the following is a disadvantage in a centralized organizational structure?
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
Which of the following statements is true regarding cost-volume-profit analysis?
Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?
Which of the following responsibilities would ordinary fall under the help desk function of an organization?
Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?
According to IIA guidance, which of the following links computers and enables them to -communicate with each other?
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
Which of the following techniques would best detect on inventory fraud scheme?
An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety
The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
During which phase of the contracting process ere contracts drafted for a proposed business activity?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
Which of the following is true regarding reporting on the quality assurance and improvement program (QAIP)?
Which of the following scenarios would require the chief audit executive (CAE) to change the internal audit plan and seek approval for the changes from the board?
Which of the following IT layers would require the organization to maintain communication with a vendor in a tightly controlled and monitored manner?
Which of the following types of accounts must be closed at the end of the period?
According to IIA guidance, which of the following statements is true regarding the chief audit executive's (CAE’s) responsibility for following up on management action plans?
A chief audit executive (CAE) is calculating the available internal audit resource hours while planning the annual internal audit plan. The CAE needs to calculate the total number of hours available for audits. Which of the following should be deducted in order to have time available only for engagements?
Which observations should the chief audit executive include in the executive summary of the final engagement communication?
Upon completing a follow-up audit engagement, the chief audit executive (CAE) noted that management has not implemented any mitigation measures to address the high risks that were reported in the initial audit report. What initial step must the CAE take to address this situation?
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?
The internal audit function conducted an engagement on maintenance operations of a construction organization and identified several issues of medium importance. The head of maintenance proposed an improvement plan with deadlines and personnel responsible. The internal audit function issued the final report to senior management. Senior management was dissatisfied with the report as they believed that improvement plan deadlines should be considerably shorter. Which of the following should the internal audit function change in the reporting process?
According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?
An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?
Which of the following is most appropriate for the chief audit executive to keep in mind when establishing policies and procedures to guide the internal audit function?
Which of the following is a sound network configuration practice to enhance information security?
When auditing the account receivables for the first time, an internal auditor noted that the finance team had not—over many accounting periods—reviewed the accounts receivables for debts that could no longer be collected. How should the auditor proceed?
A newly appointed chief audit executive (CAE) reviews current reporting practices. The CAE notices that exit meetings tend to be unproductive. When internal auditors present summaries of observations, engagement clients consistently complain that they do not understand where the observations come from. Which of the following could improve this situation?
The finance department of an organization recently undertook an asset verification exercise. The internal audit function scheduled a review of the IT department’s operations, which includes verifying the existence of computers distributed and their assignment. Can the internal audit function consider relying on the asset verification work performed by the finance department?
After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.
Which of the following is the most likely control weakness demonstrated by the seller?
According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?
The engagement supervisor prepares the final engagement communication for dissemination. Since the chief audit executive (CAE) is on leave, the supervisor is delegated to disseminate the final engagement communication to all relevant parties. Who should be accountable for the final engagement communication?
An internal audit function has commenced its annual follow-up activity. An internal auditor has been assigned to verify whether the recommendations from an audit engagement completed three months ago were implemented by the business unit. The auditor had not participated in that audit engagement. What should the auditor do first?
How should internal auditors respond when the manager of an area under review disagrees with a finding?
Which of the following would be most likely included in the internal audit procedures manual?
During the process of setting the annual audit plan, the chief audit executive receives a request from senior management to conduct an assurance engagement on the cybersecurity controls of the organization. Which of the following is a reason cybersecurity should be included in the annual internal audit plan?
As part of internal audit's risk assessment, a chief audit executive is determining certain factors as part of planning the areas to audit within an organization that makes silicon chips. Which of the following would be considered a subjective factor as part of the risk assessment?
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and
telecommunications, but does not have servers or infrastructure equipment?
According to IIA guidance, whose input must be considered when developing the annual internal audit plan?
Which of the following is a characteristic of using a hierarchical control structure?
During an internal audit engagement, numerous deficiencies in the organization's management of customer data were discovered, entailing the risk of breaching personal data protection legislation. An improvement plan was approved by senior management. Which of the following conditions observed during the periodic follow-up process best justifies the chief audit executive's decision to escalate the issue to the board?
Which of the following statements is true regarding an organization's chief audit executive (CAE) when prioritizing the audit universe?
Which of the following scenarios indicates an effective use of financial leverage?