ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Which of the following IT layers would require the organization to maintain communication with a vendor in a tightly controlled and monitored manner?

A.
Applications
A.
Applications
Answers
B.
Technical infrastructure.
B.
Technical infrastructure.
Answers
C.
External connections.
C.
External connections.
Answers
D.
IT management
D.
IT management
Answers
Suggested answer: B

While performing an audit of a car tire manufacturing plant, an internal auditor noticed a significant decrease in the number of tires produced from the previous operating period. To determine whether worker inefficiency caused the decrease, what additional information should the auditor request?

A.
Total tire production labor hours for the operating period.
A.
Total tire production labor hours for the operating period.
Answers
B.
Total tire production costs for the operating period.
B.
Total tire production costs for the operating period.
Answers
C.
Plant production employee headcount average for the operating period.
C.
Plant production employee headcount average for the operating period.
Answers
D.
The production machinery utilization rates.
D.
The production machinery utilization rates.
Answers
Suggested answer: C

Which of the following storage options would give the organization the best chance of recovering data?

A.
Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.
A.
Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.
Answers
B.
Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.
B.
Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.
Answers
C.
Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.
C.
Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.
Answers
D.
Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readily available.
D.
Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readily available.
Answers
Suggested answer: D

A small chain of grocery stores made a reporting error and understated its ending inventory. What effect would this have on the income statement for the following year?

A.
Net income would be understated.
A.
Net income would be understated.
Answers
B.
Net income would not be affected.
B.
Net income would not be affected.
Answers
C.
Net income would be overstated.
C.
Net income would be overstated.
Answers
D.
Net income would be negative.
D.
Net income would be negative.
Answers
Suggested answer: C

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

A.
Rooting.
A.
Rooting.
Answers
B.
Eavesdropping.
B.
Eavesdropping.
Answers
C.
Man in the middle.
C.
Man in the middle.
Answers
D.
Session hijacking.
D.
Session hijacking.
Answers
Suggested answer: A

Which of the following measures the operating success of a company for a given period of time?

A.
Liquidity ratios.
A.
Liquidity ratios.
Answers
B.
Profitability ratios.
B.
Profitability ratios.
Answers
C.
Solvency ratios.
C.
Solvency ratios.
Answers
D.
Current ratios.
D.
Current ratios.
Answers
Suggested answer: B

When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?

A.
Whether every call that the service provider received was logged by the help desk.
A.
Whether every call that the service provider received was logged by the help desk.
Answers
B.
Whether a unique identification number was assigned to each issue identified by the service provider
B.
Whether a unique identification number was assigned to each issue identified by the service provider
Answers
C.
Whether the service provider used its own facilities to provide help desk services
C.
Whether the service provider used its own facilities to provide help desk services
Answers
D.
Whether the provider's responses and resolutions were well defined according to the service-level agreement.
D.
Whether the provider's responses and resolutions were well defined according to the service-level agreement.
Answers
Suggested answer: D

An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?

A.
To inform the classification of the data population.
A.
To inform the classification of the data population.
Answers
B.
To determine the completeness and accuracy of the data.
B.
To determine the completeness and accuracy of the data.
Answers
C.
To identify whether the population contains outliers.
C.
To identify whether the population contains outliers.
Answers
D.
To determine whether duplicates in the data inflate the range.
D.
To determine whether duplicates in the data inflate the range.
Answers
Suggested answer: C

Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?

A.
Frozen site
A.
Frozen site
Answers
B.
Cold site
B.
Cold site
Answers
C.
Warm site
C.
Warm site
Answers
D.
Hot site
D.
Hot site
Answers
Suggested answer: B

What is the primary risk associated with an organization adopting a decentralized structure?

A.
Inability to adapt.
A.
Inability to adapt.
Answers
B.
Greater costs of control function.
B.
Greater costs of control function.
Answers
C.
Inconsistency in decision making.
C.
Inconsistency in decision making.
Answers
D.
Lack of resilience.
D.
Lack of resilience.
Answers
Suggested answer: C
Total 340 questions
Go to page: of 34