Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

IIA IIA-CIA-Part3 Dumps

Internal Audit Function Questions and Answers

Question 1

Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?

Options:

A.

Decentralized

B.

Centralized

C.

Departmentalized

D.

Tall structure

Question 2

According to IIA guidance, which of the following are typical physical and environmental IT controls?

Options:

A.

Locating servers in locked rooms with restricted admission.

B.

Applying encryption where confidentiality is a stated requirement.

C.

Allocating and controlling access rights according to the organization's stated policy.

D.

Ensuring a tightly controlled process for applying all changes and patches to software, systems, network components, and data.

Question 3

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?

Options:

A.

The auditor eliminated duplicate information.

B.

The auditor organized data to minimize useless information.

C.

The auditor made data usable for a specific purpose by ensuring that anomalies were Identified and corrected.

D.

The auditor ensured data fields were consistent and that data could be used for a specific purpose.

Question 4

An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?

Options:

A.

Designing and maintaining the database.

B.

Preparing input data and maintaining the database.

C.

Maintaining the database and providing its security,

D.

Designing the database and providing its security

Question 5

To achieve conformance with the Global Internal Audit Standards, the chief audit executive must include which of the following activities in the quality assurance and improvement program (QAIP)?

Options:

A.

Require board oversight of the QAIP

B.

Assess Standards conformance for each individual assurance engagement

C.

Conduct a self-assessment at least once every five years

D.

Report the results of the QAIP to the board

Question 6

Which of the following describes how human resources can best assist in recruitment efforts for the internal audit function?

Options:

A.

Prepare competency-based interview questions and interview potential candidates

B.

Leverage the organization's intranet and recruiting agencies to search for potential candidates

C.

Forward all applications to the chief audit executive for review

D.

Select the most qualified candidate for the vacant position

Question 7

An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;

- Risks specific to the organization itself.

- Risks specific to the service provider.

- Risks shared by both the organization and the service provider

Which of the following risks should the auditor classify as specific to the service provider?

Options:

A.

Unexpected increases in outsourcing costs.

B.

Loss of data privacy.

C.

Inadequate staffing.

D.

Violation of contractual terms.

Question 8

Which of the following is a key performance indicator of the efficiency of the internal audit function?

Options:

A.

The number of audits completed

B.

The number of significant audit observations

C.

The percentage of recommendations implemented

D.

The number of training hours per auditor

Question 9

What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?

Options:

A.

Using a jailbroken or rooted smart device feature.

B.

Using only smart devices previously approved by the organization.

C.

Obtaining written assurance from the employee that security policies and procedures are followed.

D.

Introducing a security question known only by the employee.

Question 10

A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?

Options:

A.

Fixed and Variable manufacturing costs are less than the special offer selling price.

B.

The manufacturer can fulfill the order without expanding the capacities of the production facilities.

C.

Costs related to accepting this offer can be absorbed through the sale of other products.

D.

The manufacturer’s production facilities are currently operating at full capacity.

Question 11

Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.

Requested backup tapes were not returned from the offsite vendor In a timely manner.

B.

Returned backup tapes from the offsite vendor contained empty spaces.

C.

Critical systems have boon backed up more frequently than required.

D.

Critical system backup tapes are taken off site less frequently than required

Question 12

Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?

Options:

A.

A list of trustworthy, good traffic and a list of unauthorized, blocked traffic.

B.

Monitoring for vulnerabilities based on industry intelligence.

C.

Comprehensive service level agreements with vendors.

D.

Firewall and other network perimeter protection tools.

Question 13

An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?

Options:

A.

Use of a central processing unit

B.

Use of a database management system

C.

Use of a local area network

D.

Use of electronic data Interchange

Question 14

Which of the following physical access controls often functions as both a preventive and detective control?

Options:

A.

Locked doors.

B.

Firewalls.

C.

Surveillance cameras.

D.

Login IDs and passwords.

Question 15

Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?

Options:

A.

Job complicating

B.

Job rotation

C.

Job enrichment

D.

Job enlargement

Question 16

Which of the following situations best illustrates a "false positive" in the performance of a spam filter?

Options:

A.

The spam filter removed Incoming communication that included certain keywords and domains.

B.

The spam filter deleted commercial ads automatically, as they were recognized as unwanted.

C.

The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.

D.

The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.

Question 17

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:

A.

Direct product costs

B.

Indirect costs

C.

Direct period costs

D.

Indirect period costs

Question 18

During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?

Options:

A.

Intrinsic reward.

B.

Job enrichment

C.

Extrinsic reward.

D.

The hierarchy of needs.

Question 19

IT governance begins with which of the following activities?

Options:

A.

Identification of risk-mitigating options.

B.

Definition of IT objectives.

C.

Identification of IT risk events.

D.

Definition of risk response policies.

Question 20

Which of the following scenarios best illustrates a spear phishing attack?

Options:

A.

Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.

B.

A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.

C.

A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.

D.

Many users of a social network service received fake notifications of a unique opportunity to invest in a new product

Question 21

Which of the following is required in effective IT change management?

Options:

A.

The sole responsibility for change management is assigned to an experienced and competent IT team

B.

Change management follows a consistent process and is done in a controlled environment.

C.

Internal audit participates in the implementation of change management throughout the organisation.

D.

All changes to systems must be approved by the highest level of authority within an organization.

Question 22

Which of the following storage options would give the organization the best chance of recovering data?

Options:

A.

Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.

B.

Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.

C.

Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.

D.

Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.

Question 23

The management of working capital is most crucial for which of the following aspects of business?

Options:

A.

Liquidity

B.

Profitability

C.

Solvency

D.

Efficiency

Question 24

According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?

Options:

A.

Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations

B.

Drafting a strong contract that requires regular vendor control reports and a right-to-audit clause

C.

Applying administrative privileges to ensure right-to-access controls are appropriate

D.

Creating a standing cybersecurity committee to identify and manage risks related to data security

Question 25

The chief audit executive hired a consultant to update the internal audit function’s methodologies. Which of the following would best ensure that the internal audit function will adhere to the updated methodologies?

Options:

A.

Placing the updated methodologies in an easily accessible location for reference

B.

Requiring a signed acknowledgment that each auditor will comply with the updated methodologies

C.

Preparing a recorded training that reviews the updated methodologies

D.

Sharing a one-page summary of the updated methodologies during an internal audit function meeting

Question 26

The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (lAArs) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA. Which of the following staffing approaches is the CAE most likely lo select?

Options:

A.

Assign a team with a trained audit manager to plan each audit and distribute field work tasks to various staff auditors.

B.

Assign a team of personnel who have different specialties to each audit and empower Team members to participate fully in key decisions

C.

Assign a team to each audit, designate a single person to be responsible for each phase of the audit, and limit decision making outside of their area of responsibility.

D.

Assign a team of personnel who have similar specialties to specific engagements that would benefit from those specialties and limit Key decisions to the senior person.

Question 27

With regard to project management, which of the following statements about project crashing is true?

Options:

A.

It leads to an increase in risk and often results in rework.

B.

It is an optimization technique where activities are performed in parallel rather than sequentially.

C.

It involves a revaluation of project requirements and/or scope.

D.

It is a compression technique in which resources are added to the project.

Question 28

Which of the following statements regarding flat and hierarchical internal audit functions is true?

Options:

A.

A flat structure creates an internal audit function that is highly knowledgeable and collaborative

B.

A hierarchical structure requires little supervision, and the work performed is consistent and reliable

C.

A flat structure allows for growth within the function and leads to the cultivation of diverse skills and fresh perspectives

D.

A hierarchical structure tends to result in a higher cost base due to higher salaries to retain auditors with high knowledge and experience

Question 29

While performing an audit of a car tire manufacturing plant, an internal auditor noticed a significant decrease in the number of tires produced from the previous operating

period. To determine whether worker inefficiency caused the decrease, what additional information should the auditor request?

Options:

A.

Total tire production labor hours for the operating period.

B.

Total tire production costs for the operating period.

C.

Plant production employee headcount average for the operating period.

D.

The production machinery utilization rates.

Question 30

After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.

Which of the following is the most likely control weakness demonstrated by the seller?

Options:

A.

Excessive collecting of information

B.

Application of social engineering

C.

Retention of incomplete information.

D.

Undue disclosure of information

Question 31

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

Options:

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity

Question 32

An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?

Options:

A.

Regular review of logs.

B.

Two-level authentication.

C.

Photos on smart cards.

D.

Restriction of access hours.

Question 33

How can the chief audit executive best provide the internal audit function with the resources needed to fulfill the annual audit plan?

Options:

A.

Improve skills by strengthening staff competencies

B.

Map the audit risk assessment to the organization's strategic plan

C.

Collaborate with other risk management functions in the organization

D.

Refine its audit processes according to the Global Internal Audit Standards

Question 34

A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?

Options:

A.

Compare to the annual cost of capital

B.

Compare to the annual interest data.

C.

Compare to the required rate of return.

D.

Compare to the net present value.

Question 35

Given the information below, which organization is in the weakest position to pay short-term debts?

Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000

Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000

Organization C: Current assets constitute $900,000; Current liabilities are $300,000

Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000

Options:

A.

Organization A

B.

Organization B

C.

Organization C

D.

Organization D

Question 36

Which of the following sites would an Internet service provider most likely use to restore operations after its servers were damaged by a natural disaster?

Options:

A.

On site.

B.

Cold site.

C.

Hot site.

D.

Warm site

Question 37

Which of the following is a systems software control?

Options:

A.

Restricting server room access to specific individuals

B.

Housing servers with sensitive software away from environmental hazards

C.

Ensuring that all user requirements are documented

D.

Performing of intrusion testing on a regular basis

Question 38

During a review of payments to supplier invoices, the internal auditor identified that the IT process allows invoice processing staff to ignore the auto-generated alert triggered when the invoice amount is different from the purchase order value. The manager explained that staff must be able to bypass the alert because of small differences in transport charges. Which of the following would be the most appropriate internal audit recommendation?

Options:

A.

The alert is a control that should never be ignored, and suppliers should be advised that invoices will not be paid unless the invoice is equal to or less than purchase order value

B.

The manager should raise a purchase order amendment each time the amounts differ, and the supplier should be asked to quote the amended order number in the invoice

C.

The manager should establish a monetary limit on the amount of difference that will be tolerated, where the IT process will allow the staff to ignore the alert

D.

No additional controls are needed, as it is appropriate for a process to allow staff to exercise discretion when processing invoices

Question 39

An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?

Options:

A.

The organizational chart shows only formal relationships.

B.

The organizational chart shows only the line of authority.

C.

The organizational chart shows only the senior management positions.

D.

The organizational chart is irrelevant when testing the control environment.

Question 40

Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?

Options:

A.

Periodic assessments

B.

Ongoing monitoring

C.

Full external assessments

D.

Self-Assessment with Independent Validation (SAIV)

Question 41

Which of the following activities best illustrates a user's authentication control?

Options:

A.

Identity requests are approved in two steps.

B.

Logs are checked for misaligned identities and access rights.

C.

Users have to validate their identity with a smart card.

D.

Functions can toe performed based on access rights

Question 42

When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?

Options:

A.

Whether every call that the service provider received was logged by the help desk.

B.

Whether a unique identification number was assigned to each issue identified by the service provider

C.

Whether the service provider used its own facilities to provide help desk services

D.

Whether the provider's responses and resolutions were well defined according to the service-level agreement.

Question 43

Which of the following is an indicator of liquidity that is more dependable than working capital?

Options:

A.

Acid-test (quick) ratio

B.

Average collection period

C.

Current ratio.

D.

Inventory turnover.

Question 44

Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?

Options:

A.

It calculates the overall value of a project.

B.

It ignores the time value of money.

C.

It calculates the time a project takes to break even.

D.

It begins at time zero for the project.

Question 45

According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?

Options:

A.

HTTP sites provide sufficient security to protect customers' credit card information.

B.

Web servers store credit cardholders' information submitted for payment.

C.

Database servers send cardholders’ information for authorization in clear text.

D.

Payment gatewaysauthorizecredit cardonlinepayments.

Question 46

Which of the following controls would be most efficient to protect business data from corruption and errors?

Options:

A.

Controls to ensure data is unable to be accessed without authorization.

B.

Controls to calculate batch totals to identify an error before approval.

C.

Controls to encrypt the data so that corruption is likely ineffective.

D.

Controls to quickly identify malicious intrusion attempts.

Question 47

An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?

Options:

A.

The capital accounts of the partners should be increased by she original cost of the contributed equipment.

B.

The capital accounts should be increased using a weighted average based by the current percentage of ownership.

C.

No action is needed, as the capital account of each partner was increased by the correct amount,

D.

The capital accounts of the partners should be increased by She fair market value of their contribution.

Question 48

Which statement is true regarding the development of a risk-based internal audit plan?

Options:

A.

It requires a previously conducted assurance engagement on the organization’s risk management maturity

B.

It requires an assessment by the internal audit function of key risks identified within the organization's risk management system

C.

It requires that at least 90% of planned engagements address areas critical to the organization's strategy

D.

It requires that an organization adheres to a well-recognized risk management framework in order to identify and manage its risks

Question 49

Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?

Options:

A.

Warm site recovery plan.

B.

Hot site recovery plan.

C.

Cool site recovery plan.

D.

Cold site recovery plan.

Question 50

Focus An organization has decided to have all employees work from home. Which of the following network types would securely enable this approach?

Options:

A.

A wireless local area network (WLAN ).

B.

A personal area network (PAN).

C.

A wide area network (WAN).

D.

A virtual private network (VPN)

Question 51

Which of the following scenarios would require the chief audit executive (CAE) to change the internal audit plan and seek approval for the changes from the board?

Options:

A.

The CAE meets with the organization's new CFO to review the internal audit plan. After reviewing the plan, the CFO is satisfied that the plan addressed the top risks facing the organization

B.

The CAE oversees an internal audit function that has one IT auditor on staff. This auditor left the organization eight months ago and the CAE has been unable to hire a suitable replacement

C.

The effective date of a new government regulation occurs during the internal audit plan year. The new regulation and its effective date have been public for several years

D.

The CAE oversees an internal audit function of 15 auditors. An auditor left the organization and was replaced the following week with an auditor who has similar skills and experience

Question 52

An internal audit function has commenced its annual follow-up activity. An internal auditor has been assigned to verify whether the recommendations from an audit engagement completed three months ago were implemented by the business unit. The auditor had not participated in that audit engagement. What should the auditor do first?

Options:

A.

Conduct interviews with senior management of the business unit

B.

Request information from the business unit regarding the corrective actions taken

C.

Review the previous audit findings and management's response

D.

Conduct a walkthrough of the business unit

Question 53

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

Options:

A.

Rooting.

B.

Eavesdropping.

C.

Man in the middle.

D.

Session hijacking.

Question 54

An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?

Options:

A.

The organization will be unable to develop preventative actions based on analytics.

B.

The organization will not be able to trace and monitor the activities of database administers.

C.

The organization will be unable to determine why intrusions and cyber incidents took place.

D.

The organization will be unable to upgrade the system to newer versions.

Question 55

According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?

Options:

A.

Hot recovery plan

B.

Warm recovery plan

C.

Cold recovery plan

D.

Absence of recovery plan

Question 56

Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?

Options:

A.

Whether customers are asked to renew their consent for their data processing at least quarterly.

B.

Whether private data is processed in accordance with the purpose for which the consent was obtained?

C.

Whether the organization has established explicit and entitywide policies on data transfer to third parties.

D.

Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.

Question 57

Which of the following data security policies is most likely to be the result of a data privacy law?

Options:

A.

Access to personally identifiable information is limited to those who need it to perform their job.

B.

Confidential data must be backed up and recoverable within a 24-hour period.

C.

Updates to systems containing sensitive data must be approved before being moved to production.

D.

A record of employees with access to insider information must be maintained, and those employees may not trade company stock during blackout periods.

Question 58

A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?

Options:

A.

Readiness assessment.

B.

Project risk assessment.

C.

Post-implementation review.

D.

Key phase review.

Question 59

An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?

Options:

A.

Conduct an inventory of access rights of all employees who have changed their position within the last year

B.

Remove unneeded access rights for uncovered instances and reprimand system administrators for carelessness

C.

Provide system administrators with job descriptions of employees and let them determine relevant access rights

D.

Require that access rights to IT systems be ordered by process owners based on user role descriptions

Question 60

Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?

Options:

A.

Train all employees on bring-your-own-device (BYOD) policies.

B.

Understand what procedures are in place for locking lost devices

C.

Obtain a list of all smart devices in use

D.

Test encryption of all smart devices

Question 61

Which of the following is classified as a product cost using the variable costing method?

Direct labor costs.

Insurance on a factory.

Manufacturing supplies.

Packaging and shipping costs.

Options:

A.

1 and 2

B.

1 and 3

C.

2 and 4

D.

3 and 4

Question 62

Which of the following best explains why an organization would enter into a capital lease contract?

Options:

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization’s free cash flow from operations

C.

To improve the organization’s free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Question 63

During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?

Options:

A.

The maximum tolerable downtime after the occurrence of an incident.

B.

The maximum tolerable data loss after the occurrence of an incident.

C.

The maximum tolerable risk related to the occurrence of an incident

D.

The minimum recovery resources needed after the occurrence of an incident

Question 64

Which of the following is considered a physical security control?

Options:

A.

Transaction logs are maintained to capture a history of system processing.

B.

System security settings require the use of strong passwords and access controls.

C.

Failed system login attempts are recorded and analyzed to identify potential security incidents.

D.

System servers are secured by locking mechanisms with access granted to specific individuals.

Question 65

Which of the following is an effective preventive control for data center security?

Options:

A.

Motion detectors.

B.

Key card access to the facility.

C.

Security cameras.

D.

Monitoring access to data center workstations

Question 66

Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and

telecommunications, but does not have servers or infrastructure equipment?

Options:

A.

Frozen site

B.

Cold site

C.

Warm site

D.

Hot site

Question 67

Which of the following is an established systems development methodology?

Options:

A.

Waterfall.

B.

Projects in Controlled Environments (PRINCE2).

C.

Information Technology Infrastructure Library (ITIL).

D.

COBIT

Question 68

An organization uses the management-by-objectives method, whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?

Options:

A.

It is particularly helpful to management when the organization is facing rapid change

B.

It is a more successful approach when adopted by mechanistic organizations

C.

It is more successful when goal-setting is performed not only by management, but by all team members, including lower-level staff

D.

It is particularly successful in environments that are prone to having poor employer-employee relations

Question 69

On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?

Options:

A.

It should be reported as an administrative expense on the income statement.

B.

It should be reported as period cost other than a product cost on the management accounts

C.

It should be reported as cost of goods sold on the income statement.

D.

It should be reported on the balance sheet as part of inventory.

Question 70

In light of increasing emission taxes in the European Union, a car manufacturer introduced a new middle-class hybrid vehicle specifically for the European market only. Which of the following competitive strategies has the manufacturer used?

Options:

A.

Reactive strategy.

B.

Cost leadership strategy.

C.

Differentiation strategy.

D.

Focus strategy

Question 71

The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?

Options:

A.

Beginning inventory was overstated for the year.

B.

Cost of goods sold was understated for the year.

C.

Ending inventory was understated for the year.

D.

Cost of goods sold was overstated for the year.

Question 72

A new chief audit executive (CAE) reviews long overdue audit recommendations, which have been repeatedly reported to senior management but have not been implemented, and is unsure which issues should be escalated to the board. Which of the following would serve as the best guide in this scenario?

Options:

A.

The CAE's personal judgment

B.

The organization's code of conduct

C.

The organization's risk acceptance policy

D.

The organization's internal audit charter

Question 73

An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?

Options:

A.

Normalize the data,

B.

Obtain the data

C.

Identify the risks.Analyze the data.

Question 74

Which of the following application controls, implemented by management, monitors data being processed to ensure the data remains consistent and accurate?

Options:

A.

Management trail controls

B.

Output controls.

C.

Integrity controls

D.

input controls

Question 75

Which of the following statements is true regarding data backup?

Options:

A.

System backups should always be performed in real-time.

B.

Backups should be stored in a secured location onsite for easy access.

C.

The tape rotation schedule affects how long data is retained.

D.

Backup media should be restored only in case of a hardware or software failure.

Question 76

Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?

Options:

A.

Variety.

B.

Velocity.

C.

Volume.

D.

Veracity.

Question 77

During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an Analytics tool to identify the top five vendors that received the highest sum of payments. Which of the following analytics techniques did the auditor apply?

Options:

A.

Process analysis

B.

Process mining

C.

Data analysis.

D.

Data mining

Question 78

An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?

Options:

A.

Boundary attack.

B.

Spear phishing attack.

C.

Brute force attack.

D.

Spoofing attack.

Question 79

An internal auditor uses a risk and control questionnaire as part of the preliminary survey for an audit of the organization's anti-bribery and corruption program. What is the primary purpose of using this approach?

Options:

A.

To compare records from one source to subsequently prepared records about the anti-bribery program

B.

To ascertain the existence of certain controls in the organization's anti-bribery program

C.

To obtain testimonial information about certain controls in the organization's anti-bribery program

D.

To validate control information through outside parties independent of the anti-bribery program

Question 80

Which of the following statements. Is most accurate concerning the management and audit of a web server?

Options:

A.

The file transfer protocol (FTP) should always be enabled.

B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.

C.

The number of ports and protocols allowed to access the web server should be maximized.

D.

Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.

Question 81

In a final audit report, internal auditors drafted the following management action plan with a due date of the last day of the calendar year:

"Plan: A bank reconciliation template has been updated to address issues with formulas incorrectly calculating variances."

Which critical element of the action plan is missing?

Options:

A.

The responsible personnel

B.

The status of the action plan

C.

A referral to the policy or procedure

D.

The level of risk

Question 82

Which of the following best describes the chief audit executive's responsibility for assessing the organization's residual risk?

Options:

A.

Create an action plan to mitigate the risk

B.

Incorporate management acceptance of risk in the workpapers as internal audit evidence

C.

Report deviations immediately to the board

D.

Communicate the matter with senior management

Question 83

As part of internal audit's risk assessment, a chief audit executive is determining certain factors as part of planning the areas to audit within an organization that makes silicon chips. Which of the following would be considered a subjective factor as part of the risk assessment?

Options:

A.

The number of vendors able to meet the supply demand request from the organization

B.

The quality of the staff supervision of silicon chips produced by the organization

C.

The length of time since the last audit of the organization's manufacturing facilities

D.

The asset value of the silicon chips that the organization did not produce because of a shortage in raw materials

Question 84

Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.

Requested backup tapes were not returned from the offsite vendor in a timely manner

B.

Returned backup tapes from the offsite vendor contained empty spaces

C.

Critical systems have been backed up more frequently than required

D.

Critical system backup tapes are taken off site less frequently than required

Question 85

A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?

Options:

A.

Functional departmentalization.

B.

Product departmentalization

C.

Matrix organization.

D.

Divisional organization

Question 86

Which of the following statements is true regarding user-developed applications (UDAs)?

Options:

A.

UDAs are less flexible and more difficult to configure than traditional IT applications.

B.

Updating UDAs may lead to various errors resulting from changes or corrections.

C.

UDAs typically are subjected to application development and change management controls.

D.

Using UDAs typically enhances the organization's ability to comply with regulatory factors.

Question 87

Which of the following is improved by the use of smart devices?

Options:

A.

Version control

B.

Privacy

C.

Portability

D.

Secure authentication

Question 88

During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?

Options:

A.

Initiation phase

B.

Bidding phase

C.

Development phase

D.

Negotiation phase

Question 89

At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?

Options:

A.

Project plan development.

B.

Project plan execution

C.

Integrated change control.

D.

Project quality planning

Question 90

Which of the following statements Is true regarding the use of centralized authority to govern an organization?

Options:

A.

Fraud committed through collusion is more likely when authority is centralized.

B.

Centralized managerial authority typically enhances certainty and consistency within an organization.

C.

When authority is centralized, the alignment of activities to achieve business goals typically is decreased.

D.

Using separation of duties to mitigate collusion is reduced only when authority is centralized.

Question 91

Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?

Options:

A.

Income statement.

B.

Owner's equity statement.

C.

Balance sheet.

D.

Statement of cash flows.

Question 92

An organization’s account for office supplies on hand had a balance of $9,000 at the end of year one. During year two, the organization recorded an expense for purchasing office supplies. At the end of year two, a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?

Options:

A.

A debit to office supplies on hand for $2,500

B.

A debit to office supplies on hand for $11,500

C.

A debit to office supplies on hand for $20,500

D.

A debit to office supplies on hand for $42,500

Question 93

According to The IIA's Three Lines Model, which of the following IT security activities is commonly shared by all three lines?

Options:

A.

Assessments of third parties and suppliers.

B.

Recruitment and retention of certified IT talent.

C.

Classification of data and design of access privileges.

D.

Creation and maintenance of secure network and device configuration.

Question 94

Which of the following is true regarding the use of remote wipe for smart devices?

Options:

A.

It can restore default settings and lock encrypted data when necessary.

B.

It enables the erasure and reformatting of secure digital (SD) cards.

C.

It can delete data backed up to a desktop for complete protection if required.

D.

It can wipe data that is backed up via cloud computing

Question 95

A chief audit executive (CAE) is developing a strategic plan for the internal audit function. In the last two years, the organization has faced significant IT risks, but the internal audit function has not been able to audit those areas due to a lack of knowledge. How could the CAE address this in the strategic plan?

Options:

A.

Purchase a data analytics program for the internal audit function

B.

Hold listening sessions to receive management's input on the strategic plan

C.

Develop a succession plan for the internal audit function to avoid staffing deficiencies

D.

Identify relevant training resources to strengthen staff skillsets

Question 96

The internal audit function of a manufacturing organization is conducting an advisory engagement. The engagement team identifies a gap in procedures: there is no documentation for the activities that take place when new site construction projects are completed. In practice, these activities include the transfer of assets from the development department to the production department. What is the most appropriate action for the engagement team?

Options:

A.

Circulate a risk and control questionnaire to identify construction process risks

B.

Facilitate design of a checklist that can be used during asset transfer

C.

Carry out a root cause analysis to identify the underlying reasons of the process gap

D.

Allocate additional resources to the production department to better handle the new assets

Question 97

Which of the following IT disaster recovery plans includes a remote site designated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?

Options:

A.

Frozen site

B.

Cold site

C.

Warm site

D.

Hot site

Question 98

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:

A.

Direct, product costs.

B.

Indirect product costs.

C.

Direct period costs,

D.

Indirect period costs

Question 99

An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?

Options:

A.

To inform the classification of the data population.

B.

To determine the completeness and accuracy of the data.

C.

To identify whether the population contains outliers.

D.

To determine whether duplicates in the data inflate the range.

Question 100

A chief audit executive (CAE) joined an organization in the middle of the financial year. A risk-based annual audit plan has been approved by the board and is already underway. However, after discussions with key stakeholders, the CAE realizes that some significant key risk areas have not been covered in the original audit plan. How should the CAE respond?

Options:

A.

Commit to delivering the original annual audit plan as it has already been approved by the board

B.

Revise the plan to incorporate the newly identified risks, and communicate significant interim changes to senior management and the board for review and approval

C.

Ensure that the newly identified risks are included in the next year's annual audit plan

D.

Assign internal auditors to immediately perform assurance engagements in the areas where the new risks have been identified, due to their significance

Question 101

Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?

Options:

A.

Clothing company designs, makes, and sells a new item.

B.

A commercial construction company is hired to build a warehouse.

C.

A city department sets up a new firefighter training program.

D.

A manufacturing organization acquires component parts from a contracted vendor

Question 102

Which of the following situations best applies to an organization that uses a project, rather than a process, to accomplish its business activities?

Options:

A.

A clothing company designs, makes, and sells a new item

B.

A commercial construction company is hired to build a warehouse

C.

A city department sets up a new firefighter training program

D.

A manufacturing organization acquires component parts from a contracted vendor

Question 103

The manager of the sales department wants to Increase the organization's net profit margin by 7% (from 43% in the prior year to 50% in the current year). Given the information provided in the table below, what would be the targeted sales amount for the current year?

as

Options:

A.

$20,000,000

B.

$24.500.000

C.

$30.000.000

D.

$35.200.000

Question 104

Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?

Options:

A.

Predictive analytics

B.

Prescriptive analytics

C.

Descriptive analytics

D.

Diagnostic analytics

Question 105

When using data analytics during a review of the procurement process, what is the first step in the analysis process?

Options:

A.

Identify data anomalies and outliers

B.

Define questions to be answered

C.

Identify data sources available

D.

Determine the scope of the data extract

Question 106

Which of the following is a characteristic of using a hierarchical control structure?

Options:

A.

Less use of policies and procedures.

B.

Less organizational commitment by employees.

C.

Less emphasis on extrinsic rewards.

D.

Less employee’s turnover.

Question 107

Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?

Options:

A.

Volume.

B.

Velocity.

C.

Variety.

D.

Veracity.

Question 108

Which of the following statements is true regarding the management-by-objectives (MBO) approach?

Options:

A.

Management by objectives is most helpful in organizations that have rapid changes

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks

C.

Management by objectives helps organizations to keep employees motivated

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals

Question 109

Which of the following is the starting point for a chief audit executive to prioritize engagements to be included in the internal audit plan?

Options:

A.

A risk management maturity model

B.

A risk matrix

C.

An annual assurance map

D.

An internal control framework

Question 110

A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services. Which of the following best describes the restaurants strategy?

Options:

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Question 111

Which of the following physical security controls is able to serve as both a detective and preventive control?

Options:

A.

Authentication logs.

B.

Card key readers.

C.

Biometric devices

D.

Video surveillance.

Question 112

Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?

Options:

A.

Anti-malware software

B.

Authentication

C.

Spyware

D.

Rooting

Question 113

Which of the following represents an example of a physical security control?

Options:

A.

Access rights are allocated according to the organization’s policy

B.

There is confirmation that data output is accurate and complete

C.

Servers are located in locked rooms to which access is restricted

D.

A record is maintained to track the process from data input to storage

Question 114

Which of the following best describes the purpose of fixed manufacturing costs?

Options:

A.

To ensure availability of production facilities.

B.

To decrease direct expenses related to production.

C.

To incur stable costs despite operating capacity.

D.

To increase the total unit cost under absorption costing

Question 115

A organization finalized a contract in which a vendor is expected to design, procure, and construct a power substation for $3,000,000. In this scenario, the organization agreed to which of the following types of contracts?

Options:

A.

A cost-reimbursable contract.

B.

A lump-sum contract.

C.

A time and material contract.

D.

A bilateral contract.

Question 116

If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?

Options:

A.

Settlement of short-term obligations may become difficult.

B.

Cash may be bed up in items not generating financial value.

C.

Collection policies of the organization are ineffective.

D.

The organization is efficient in using assets to generate revenue.

Question 117

Which of the following is true regarding reporting on the quality assurance and improvement program (QAIP)?

Options:

A.

The results of ongoing monitoring must be communicated annually to the board and other appropriate stakeholders

B.

The results of any periodic self-assessment and level of conformance with the Global Internal Audit Standards must be reported to the board before completion

C.

The results of any external assessments and level of conformance with the Standards must be reported to the board before completion

D.

The QAIP and the resulting action plan must be made available to external assessors

Question 118

Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?

Options:

A.

The organization sells inventory to an overseas subsidiary at fair value.

B.

The local subsidiary purchases inventory at a discounted price.

C.

The organization sells inventory to an overseas subsidiary at the original cost.

D.

The local subsidiary purchases inventory at the depreciated cost.A

Question 119

Which of the following responsibilities would ordinary fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support.

B.

Management of infrastructure services, including network management.

C.

Physical hosting of mainframes and distributed servers

D.

End-to -end security architecture design.

Question 120

According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?

Options:

A.

Formulas and static data are locked or protected.

B.

The spreadsheet is stored on a network server that is backed up daily.

C.

The purpose and use of the spreadsheet are documented.

D.

Check-in and check-out software is used to control versions.

Question 121

Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?

Options:

A.

A warm recovery plan.

B.

A cold recovery plan.

C.

A hot recovery plan.

D.

A manual work processes plan

Question 122

In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?

Options:

A.

Input controls

B.

Segregation of duties

C.

Physical controls

D.

Integrity controls

Question 123

According to IIA guidance, which of the following statements is true regarding analytical procedures?

Options:

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences, but cannot be used to identify the absence of differences

Question 124

Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

Options:

A.

First-in. first-out method (FIFO).

B.

Last-in, first-out method (LIFO).

C.

Specific identification method.

D.

Average-cost method

Question 125

Which of the following capital budgeting techniques considers the tune value of money?

Options:

A.

Annual rate of return.

B.

Incremental analysis.

C.

Discounted cash flow.

D.

Cash payback

Question 126

A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?

Options:

A.

Fixed and variable manufacturing costs are less than the special offer selling price

B.

The manufacturer can fulfill the order without expanding the capacities of the production facilities

C.

Costs related to accepting this offer can be absorbed through the sale of other products

D.

The manufacturer’s production facilities are currently operating at full capacity

Question 127

An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?

Options:

A.

Horizontal analysis

B.

Vertical analysis

C.

Ratio analysis

D.

Trend analysis

Question 128

Which of the following is true of matrix organizations?

Options:

A.

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.

B.

A combination of product and functional departments allows management to utilize personnel from various Junctions.

C.

Authority, responsibility and accountability of the units Involved may vary based on the project's life, or the organization's culture

D.

It is best suited for firms with scattered locations or for multi-line, Large-scale firms.

Question 129

The engagement supervisor prepares the final engagement communication for dissemination. Since the chief audit executive (CAE) is on leave, the supervisor is delegated to disseminate the final engagement communication to all relevant parties. Who should be accountable for the final engagement communication?

Options:

A.

Engagement supervisor

B.

Chief audit executive

C.

The board

D.

The internal audit team

Question 130

How do data analysis technologies affect internal audit testing?

Options:

A.

They improve the effectiveness of spot check testing techniques.

B.

They allow greater insight into high risk areas.

C.

They reduce the overall scope of the audit engagement,

D.

They increase the internal auditor's objectivity.

Question 131

An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?

Options:

A.

Infrastructure as a Service (laaS).

B.

Platform as a Service (PaaS).

C.

Enterprise as a Service (EaaS).

D.

Software as a Service (SaaS).

Question 132

A one-time password would most likely be generated in which of the following situations?

Options:

A.

When an employee accesses an online digital certificate

B.

When an employee's biometrics have been accepted.

C.

When an employee creates a unique digital signature,

D.

When an employee uses a key fob to produce a token.

Question 133

Which of the following biometric access controls uses the most unique human recognition characteristic?

Options:

A.

Facial comparison using photo identification.

B.

Signature comparison.

C.

Voice comparison.

D.

Retinal print comparison.

Question 134

According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?

Options:

A.

Relationship with supervisor

B.

Salary

C.

Security.

D.

Achievement

Question 135

Internal audit discovered that several loads of pellets were deleted from the scaling database and consequently had no sales invoices, significantly affecting financial statements. An investigation revealed that technicians had deleted the pellet loads accidentally, with no evidence of fraud. Which of the following actions should management implement first?

Options:

A.

Address root causes by launching a project to understand and revise the methods for granting database access rights

B.

Address the condition by limiting technicians' access to live database data

C.

Address potential risks by reconciling all sales invoices against scaling data

D.

Address investigation results by dismissing technicians who caused the disruption

Question 136

Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?

Options:

A.

At the value agreed upon by the partners.

B.

At book value.

C.

At fair value

D.

At the original cost.

Question 137

Which of the following best describes a transformational leader, as opposed to a transactional leader?

Options:

A.

The leader searches for deviations from the rules and standards and intervenes when deviations exist.

B.

The leader intervenes only when performance standards are not met.

C.

The leader intervenes to communicate high expectations.

D.

The leader does not intervene to promote problem-solving

Question 138

Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?

Options:

A.

IT database administrator.

B.

IT data center manager.

C.

IT help desk function.

D.

IT network administrator.

Question 139

Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?

Options:

A.

Cash payback technique

B.

Annual rate of return technique.

C.

Internal rate of return method.

D.

Net present value method.

Question 140

According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

Options:

A.

The business continuity management charter

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Question 141

Which of the following is a disadvantage in a centralized organizational structure?

Options:

A.

Communication conflicts

B.

Slower decision making.

C.

Loss of economies of scale

D.

Vulnerabilities in sharing knowledge

Question 142

Which of the following would be a concern related to the authorization controls utilized for a system?

Options:

A.

Users can only see certain screens in the system.

B.

Users are making frequent password change requests.

C.

Users Input Incorrect passwords and get denied system access

D.

Users are all permitted uniform access to the system.

Question 143

During an internal audit engagement, it was found that several vendors were on a government sanctions list and must no longer be traded with. Which of the following would most effectively mitigate the risk of noncompliance with sanctions lists that are updated regularly?

Options:

A.

Agreements with sanctioned vendors discovered by internal audit will be placed on hold until further notice from the government

B.

A new procedure of vendor onboarding will be implemented to ensure that all new vendors undergo screenings against the sanctions list

C.

Controls will be embedded in the vendor management processes to ensure that new and existing vendors are compliant with changes to the sanctions list

D.

The legal team will be asked to prepare counter arguments to dispute audit findings and potential inquiries from the governmental authority

Question 144

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

Options:

A.

An extranet

B.

A local area network

C.

An Intranet

D.

The internet

Question 145

Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?

Options:

A.

Predictive analytics.

B.

Prescriptive analytics.

C.

Descriptive analytics.

D.

Diagnostic analytics.

Question 146

An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recovery solution?

Options:

A.

Data is synchronized in real time.

B.

Recovery time is expected to be less than one week.

C.

Servers are not available and need to be procured.

D.

Recovery resources and data restore processes have been defined.

Question 147

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

Options:

A.

Session hijacking.

B.

Jailbreaking

C.

Eavesdropping,

D.

Authentication.

Question 148

Which of the following security controls focuses most on prevention of unauthorized access to the power plant?

Options:

A.

An offboarding procedure is initiated monthly to determine redundant physical access rights.

B.

Logs generated by smart locks are automatically scanned to identify anomalies in access patterns.

C.

Requests for additional access rights are sent for approval and validation by direct supervisors.

D.

Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours

Question 149

During which phase of the contracting process are contracts drafted for a proposed business activity?

Options:

A.

Initiation phase.

B.

Bidding phase.

C.

Development phase.

D.

Management phase.

Question 150

What relationship exists between decentralization and the degree, importance, and range of lower-level decision making?

Options:

A.

Mutually exclusive relationship.

B.

Direct relationship.

C.

Intrinsic relationship.

D.

Inverse relationship.

Question 151

Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?

Options:

A.

A traditional key lock.

B.

A biometric device.

C.

A card-key system.

D.

A proximity device.

Question 152

Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?

Options:

A.

Managerial accounting uses double-entry accounting and cost data.

B.

Managerial accounting uses general accepted accounting principles.

C.

Managerial accounting involves decision making based on quantifiable economic events.

D.

Managerial accounting involves decision making based on predetermined standards.

Question 153

An internal audit uncovered high-risk issues that needed to be addressed by the organization. During the exit conference, the audit team discussed the high-risk issues with the manager responsible for addressing them. How should the chief audit executive respond if the manager agrees to correct the issues identified during the audit?

Options:

A.

Include in the report that management has agreed to address the issue and set a date for follow-up

B.

Include an assignment in the annual internal audit plan to perform a follow-up audit

C.

Discuss the audit observation with senior management

D.

Solicit input from management and create the action plan

Question 154

Which of the following is most influenced by a retained earnings policy?

Options:

A.

Cash.

B.

Dividends.

C.

Gross margin.

D.

Net income.

Page: 1 / 51
Total 514 questions