IIA IIA-CIA-Part3 Practice Test - Questions Answers
List of questions
Question 1

Which of the following best describes the purpose of fixed manufacturing costs?
Question 2

Which of the following is a characteristic of using a hierarchical control structure?
Question 3

An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
Question 4

According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?
Question 5

Which of the following scenarios indicates an effective use of financial leverage?
Question 6

Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?
Question 7

Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
Question 8

Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
Question 9

Which of the following security controls would provide the most efficient and effective authentication for customers to access these online shopping account?
Question 10

An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data.
What would be the most appropriate directive control in this area?
Question