ExamGecko
Home Home / IIA / IIA-CIA-Part2

IIA IIA-CIA-Part2 Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











During audit engagement planning, an internal auditor is determining the best approach for leveraging computer-assisted audit techniques (CAATs). Which of the following approaches maximizes the use of CAATs and why?

A.
Tracing, because it would enable the auditor to verify quickly that the record counts were properly included in the compilation.
A.
Tracing, because it would enable the auditor to verify quickly that the record counts were properly included in the compilation.
Answers
B.
Inspection, because it would enable the auditor to verify how management enters the data into the application for processing.
B.
Inspection, because it would enable the auditor to verify how management enters the data into the application for processing.
Answers
C.
Testing data, because it would enable the auditor to ensure that the application processes the transaction as described by management.
C.
Testing data, because it would enable the auditor to ensure that the application processes the transaction as described by management.
Answers
D.
Reperformance, because it enables the auditor to verify that the application performed the calculation correctly.
D.
Reperformance, because it enables the auditor to verify that the application performed the calculation correctly.
Answers
Suggested answer: D

Which of the following statements is true regarding risk assessments, including the evaluation and prioritization of risk and control factors?

A.
A risk-by-process matrix enables the user to determine associations between any of the processes and the risks.
A.
A risk-by-process matrix enables the user to determine associations between any of the processes and the risks.
Answers
B.
The risk-factor approach for linking business processes and risks is more direct than the use of a risk-by-process matrix.
B.
The risk-factor approach for linking business processes and risks is more direct than the use of a risk-by-process matrix.
Answers
C.
Internal risk factors are built into the environment and the nature of the process itself.
C.
Internal risk factors are built into the environment and the nature of the process itself.
Answers
D.
A risk map is used primarily to depict which risks will be reduced and which will be shared.
D.
A risk map is used primarily to depict which risks will be reduced and which will be shared.
Answers
Suggested answer: A

Which of the following statements is true regarding engagement planning?

A.
The scope of the engagement should be planned according to the internal audit activity's budget and then aligned to the risk universe.
A.
The scope of the engagement should be planned according to the internal audit activity's budget and then aligned to the risk universe.
Answers
B.
The audit engagement objectives should be based on operational management's view of risk objectives.
B.
The audit engagement objectives should be based on operational management's view of risk objectives.
Answers
C.
The planning phase of the engagement should be completed and approved before the fieldwork of the engagement begins.
C.
The planning phase of the engagement should be completed and approved before the fieldwork of the engagement begins.
Answers
D.
The main purpose of the engagement work program is to determine the nature and timing of procedures required to gather audit evidence.
D.
The main purpose of the engagement work program is to determine the nature and timing of procedures required to gather audit evidence.
Answers
Suggested answer: C

Which of the following actions should the chief audit executive take when senior management decides to accept risks by choosing to do business with a questionable vendor?

A.
Persuade senior management to take appropriate action.
A.
Persuade senior management to take appropriate action.
Answers
B.
Cancel issuing the engagement report due to the assumed risks.
B.
Cancel issuing the engagement report due to the assumed risks.
Answers
C.
Accept senior management's assumption of the risks.
C.
Accept senior management's assumption of the risks.
Answers
D.
Discuss the issue with the board for them to take appropriate action.
D.
Discuss the issue with the board for them to take appropriate action.
Answers
Suggested answer: D

The internal audit activity needs to review the information security function but does not have the IT expertise needed for the engagement. Which of the following actions should the chief audit executive take to ensure the internal audit activity conforms with the Standards?

A.
Assign the engagement to a staff auditor and closely review his work and report.
A.
Assign the engagement to a staff auditor and closely review his work and report.
Answers
B.
Assign the engagement to a senior auditor, who carefully researches and studies the company's IT infrastructure.
B.
Assign the engagement to a senior auditor, who carefully researches and studies the company's IT infrastructure.
Answers
C.
Contract an external service provider auditor with the experience necessary to perform the audit.
C.
Contract an external service provider auditor with the experience necessary to perform the audit.
Answers
D.
Perform the audit herself and work closely with the information security function to obtain expertise in the area.
D.
Perform the audit herself and work closely with the information security function to obtain expertise in the area.
Answers
Suggested answer: C

Which of the following steps should an internal auditor complete when conducting a review of an electronic data interchange application provided by a third-party service?

Ensure encryption keys meet ISO standards.

Determine whether an independent review of the service provider's operation has been conducted.

Verify that the service provider's contracts include necessary clauses.

Verify that only public-switched data networks are used by the service provider.

A.
1 and 3.
A.
1 and 3.
Answers
B.
1 and 4.
B.
1 and 4.
Answers
C.
2 and 3.
C.
2 and 3.
Answers
D.
2 and 4.
D.
2 and 4.
Answers
Suggested answer: C

Which of the following is an advantage of nonstatistical sampling over statistical sampling?

A.
Nonstatistical sampling provides more objective recommendations for management.
A.
Nonstatistical sampling provides more objective recommendations for management.
Answers
B.
Nonstatistical sampling provides an opportunity to select the minimum sample size required to satisfy the objectives of the audit tests.
B.
Nonstatistical sampling provides an opportunity to select the minimum sample size required to satisfy the objectives of the audit tests.
Answers
C.
Nonstatistical sampling provides for the use of subjective judgment in determining the sample size.
C.
Nonstatistical sampling provides for the use of subjective judgment in determining the sample size.
Answers
D.
Nonstatistical sampling permits the auditor to specify a level of reliability and the desired degree of precision.
D.
Nonstatistical sampling permits the auditor to specify a level of reliability and the desired degree of precision.
Answers
Suggested answer: C

Which of the following is most appropriate for internal auditors to do during the internal audit recommendations monitoring process?

A.
Report the monitoring status to senior management when requested.
A.
Report the monitoring status to senior management when requested.
Answers
B.
Assist management with implementing corrective actions.
B.
Assist management with implementing corrective actions.
Answers
C.
Determine the frequency and approach to monitoring.
C.
Determine the frequency and approach to monitoring.
Answers
D.
Include all types of observations in the monitoring process.
D.
Include all types of observations in the monitoring process.
Answers
Suggested answer: C

During the review of an organization's retail fraud deterrence program, an employee mentions that an expensive fraud surveillance information system is rarely used. The internal auditor concludes that additional staff are required to properly utilize the system to its full potential. According to IIA guidance, which criteria for evidence is most lacking to reach this conclusion?

A.
Sufficiency.
A.
Sufficiency.
Answers
B.
Reliability.
B.
Reliability.
Answers
C.
Relevancy.
C.
Relevancy.
Answers
D.
Usefulness.
D.
Usefulness.
Answers
Suggested answer: A

Which of the following is an advantage of utilizing an external fraud specialist in a suspected fraud investigation?

A.
Increased access to the organization's employees.
A.
Increased access to the organization's employees.
Answers
B.
Increased ability to preserve evidence and the chain of command.
B.
Increased ability to preserve evidence and the chain of command.
Answers
C.
Increased ability to scrutinize the organization's key business processes.
C.
Increased ability to scrutinize the organization's key business processes.
Answers
D.
Increased access to the organization's software and proprietary data.
D.
Increased access to the organization's software and proprietary data.
Answers
Suggested answer: B
Total 461 questions
Go to page: of 47