ExamGecko
Home / IIA / IIA-CIA-Part3
Ask Question

IIA-CIA-Part3: Certified Internal Auditor - Part 3, The Internal Audit Activity's -  Business Analysis and Information Technology

Vendor:

IIA

Exam Questions:
340
 Learners
  2.370
Last Updated
April - 2025
Language
English
9 Quizzes
PDF | VPLUS

This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Which of the following physical security controls is able to serve as both a detective and preventive control?

Become a Premium Member for full access
  Unlock Premium Member

Which of the following performance measures includes both profits and investment base?

Become a Premium Member for full access
  Unlock Premium Member

Which of the following statements is true regarding cost-volume-profit analysis?

Become a Premium Member for full access
  Unlock Premium Member

Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?

Become a Premium Member for full access
  Unlock Premium Member

At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?

Become a Premium Member for full access
  Unlock Premium Member

A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?

Become a Premium Member for full access
  Unlock Premium Member

Which of the following is the best example of a compliance risk that Is likely to arise when adopting a bring-your-own-device (BYOD) policy?

Become a Premium Member for full access
  Unlock Premium Member

A newly appointed board member received an email that appeared to be from the company's CEO.

The email stated:

"Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners." The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?

A risk of spyware and malware.
A risk of spyware and malware.
A risk of corporate espionage.
A risk of corporate espionage.
A ransomware attack risk.
A ransomware attack risk.
A social engineering risk.
A social engineering risk.
Suggested answer: A
asked 18/09/2024
Leandro Ruwer
50 questions

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

Become a Premium Member for full access
  Unlock Premium Member

An internal audit activity is piloting a data analytics model, which aims to identify anomalies in payments to vendors and potential fraud indicators. Which of the following would be the most appropriate criteria for assessing the success of the piloted model?

Become a Premium Member for full access
  Unlock Premium Member