ExamGecko
Home Home / IIA / IIA-CIA-Part1

IIA IIA-CIA-Part1 Practice Test - Questions Answers, Page 29

Question list
Search
Search

Related questions











Which of the following scenarios best illustrates a rationalization as the root cause of potential fraud?

A.
Managers who have been with the organization for several decades become aware that newly hired, younger managers are being moved more quickly into senior positions.
A.
Managers who have been with the organization for several decades become aware that newly hired, younger managers are being moved more quickly into senior positions.
Answers
B.
The controller at a nationwide manufacturing company recently opted to no longer require twoweek mandatory vacations for accounting staff.
B.
The controller at a nationwide manufacturing company recently opted to no longer require twoweek mandatory vacations for accounting staff.
Answers
C.
Security cameras that monitor cash handling at the register are not functioning.
C.
Security cameras that monitor cash handling at the register are not functioning.
Answers
D.
The organization is slowly phasing out three mature products that produce the highest commissions for the sales staff
D.
The organization is slowly phasing out three mature products that produce the highest commissions for the sales staff
Answers
Suggested answer: A

Which of the following is a primary responsibility of senior management with respect to ethical violations?

A.
Senior management provides oversight for the organization's ethical climate.
A.
Senior management provides oversight for the organization's ethical climate.
Answers
B.
Senior management promotes an ethical culture in the organization.
B.
Senior management promotes an ethical culture in the organization.
Answers
C.
Senior management assesses the effectiveness of the organization's ethical programs.
C.
Senior management assesses the effectiveness of the organization's ethical programs.
Answers
D.
Senior management reviews major ethical policies in the organization for compliance
D.
Senior management reviews major ethical policies in the organization for compliance
Answers
Suggested answer: C

With regard to IT governance, which of the following is the most effective and appropriate role for the internal audit activity?

A.
Independently evaluate the skills and experience of potential chief information officer candidates to assess the best fit based on the organization's risk appetite.
A.
Independently evaluate the skills and experience of potential chief information officer candidates to assess the best fit based on the organization's risk appetite.
Answers
B.
Evaluate the organization's governance standards and assess IT-related activities to identify gaps and develop policies, ensuring alignment with the organization's risk appetite.
B.
Evaluate the organization's governance standards and assess IT-related activities to identify gaps and develop policies, ensuring alignment with the organization's risk appetite.
Answers
C.
Assist management in interpreting complex IT-related privacy and security risk exposures and evaluating potential mitigation strategies.
C.
Assist management in interpreting complex IT-related privacy and security risk exposures and evaluating potential mitigation strategies.
Answers
D.
Assess whether governance activities are aligned with the organization's risk appetite and take into consideration emerging risks
D.
Assess whether governance activities are aligned with the organization's risk appetite and take into consideration emerging risks
Answers
Suggested answer: D

Which of the following best describes organizational governance processes?

A.
Processes employed by internal and external assurance providers to authorize, direct, and provide oversight to management to better enable the meeting of organizational objectives
A.
Processes employed by internal and external assurance providers to authorize, direct, and provide oversight to management to better enable the meeting of organizational objectives
Answers
B.
Processes employed by the board of directors to authorize and provide guidance and oversight to management to promote the achievement of organizational objectives.
B.
Processes employed by the board of directors to authorize and provide guidance and oversight to management to promote the achievement of organizational objectives.
Answers
C.
Processes employed by the board of directors and senior management to mitigate risks to acceptable levels.
C.
Processes employed by the board of directors and senior management to mitigate risks to acceptable levels.
Answers
D.
Processes employed by risk owners to mitigate risks to acceptable levels within the organization's risk appetite
D.
Processes employed by risk owners to mitigate risks to acceptable levels within the organization's risk appetite
Answers
Suggested answer: B

Which of the following is true with regard to an organization's risk management practices?

A.
Risks represent a single point estimate
A.
Risks represent a single point estimate
Answers
B.
Each organization faces the same types of risk.
B.
Each organization faces the same types of risk.
Answers
C.
Risks may relate to failing to achieve positive outcomes.
C.
Risks may relate to failing to achieve positive outcomes.
Answers
D.
Mitigated risks are no longer considered to be inherent.
D.
Mitigated risks are no longer considered to be inherent.
Answers
Suggested answer: A

Which of the following is the best way for internal auditors to demonstrate their proficiency to effectively carry out their professional responsibilities?

A.
Volunteer for audit engagements in areas or industries in which the auditor is unfamiliar
A.
Volunteer for audit engagements in areas or industries in which the auditor is unfamiliar
Answers
B.
Sign an annual attestation indicating that the auditor has all required competencies to perform her job effectively.
B.
Sign an annual attestation indicating that the auditor has all required competencies to perform her job effectively.
Answers
C.
Obtain appropriate professional certifications or other designations.
C.
Obtain appropriate professional certifications or other designations.
Answers
D.
Disclose potential impairments to independence or objectivity prior to performing an audit engagement.
D.
Disclose potential impairments to independence or objectivity prior to performing an audit engagement.
Answers
Suggested answer: C

Which of the following is the best example of a computer forensic audit activity?

A.
An internal auditor compared vendor addresses to employee home addresses.
A.
An internal auditor compared vendor addresses to employee home addresses.
Answers
B.
An internal auditor used analytical software to trace all disbursements processed on weekends.
B.
An internal auditor used analytical software to trace all disbursements processed on weekends.
Answers
C.
An internal auditor tried to circumvent the logical access controls of the purchasing system.
C.
An internal auditor tried to circumvent the logical access controls of the purchasing system.
Answers
D.
An internal auditor recovered emails of an employee who was suspected of fraudulent activities
D.
An internal auditor recovered emails of an employee who was suspected of fraudulent activities
Answers
Suggested answer: D

An IT contractor applied for an internal audit position at a bank. The contractor worked for the bank's IT security manager two years ago. If the audit manager interviewed the contractor and wants to extend a job offer, which of the following actions should the chief audit executive pursue?

A.
Allow the audit manager to hire the contractor and state that the individual is free to perform IT audits, including security.
A.
Allow the audit manager to hire the contractor and state that the individual is free to perform IT audits, including security.
Answers
B.
Not allow the audit manager to hire the contractor, as it would be a conflict of interest
B.
Not allow the audit manager to hire the contractor, as it would be a conflict of interest
Answers
C.
Allow the audit manager to hire the contractor, but state that the individual is not allowed to work on IT security audits for one year.
C.
Allow the audit manager to hire the contractor, but state that the individual is not allowed to work on IT security audits for one year.
Answers
D.
Not allow the audit manager to hire the contractor and ask the individual to apply again in one year.
D.
Not allow the audit manager to hire the contractor and ask the individual to apply again in one year.
Answers
Suggested answer: A

Which of the following types of fraud tests would be most effective if an internal auditor was looking for possible fictitious vendors?

A.
Checking for invoice amounts that do not match that of the purchase order.
A.
Checking for invoice amounts that do not match that of the purchase order.
Answers
B.
Searching for identical invoice numbers and payment amounts.
B.
Searching for identical invoice numbers and payment amounts.
Answers
C.
Running checks to uncover post office box addresses matching employee addresses.
C.
Running checks to uncover post office box addresses matching employee addresses.
Answers
D.
Comparing prices across vendors to see whether one vendor is unreasonably high.
D.
Comparing prices across vendors to see whether one vendor is unreasonably high.
Answers
Suggested answer: A

According to IIA guidance, which of the following statements is true regarding proficiency?

A.
The globally accepted Certified Internal Auditor designation is mandatory at chief audit executive levels.
A.
The globally accepted Certified Internal Auditor designation is mandatory at chief audit executive levels.
Answers
B.
Internal auditors are encouraged to obtain appropriate professional designations.
B.
Internal auditors are encouraged to obtain appropriate professional designations.
Answers
C.
Specialty designations are required for those who perform specialized audit and consulting work.
C.
Specialty designations are required for those who perform specialized audit and consulting work.
Answers
D.
Studies for professional designations are the preferred source of continuing professional education
D.
Studies for professional designations are the preferred source of continuing professional education
Answers
Suggested answer: B
Total 758 questions
Go to page: of 76