ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?

A.
Face or finger recognition equipment,
A.
Face or finger recognition equipment,
Answers
B.
Radio-frequency identification chips to authenticate employees with cards.
B.
Radio-frequency identification chips to authenticate employees with cards.
Answers
C.
A requirement to clock in and clock out with a unique personal identification number.
C.
A requirement to clock in and clock out with a unique personal identification number.
Answers
D.
A combination of a smart card and a password to clock in and clock out.
D.
A combination of a smart card and a password to clock in and clock out.
Answers
Suggested answer: A

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

A.
Higher cash flow and treasury balances.
A.
Higher cash flow and treasury balances.
Answers
B.
Higher inventory balances
B.
Higher inventory balances
Answers
C.
Higher accounts receivable.
C.
Higher accounts receivable.
Answers
D.
Higher accounts payable
D.
Higher accounts payable
Answers
Suggested answer: C

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?

A.
Not installing anti-malware software
A.
Not installing anti-malware software
Answers
B.
Updating operating software in a haphazard manner,
B.
Updating operating software in a haphazard manner,
Answers
C.
Applying a weak password for access to a mobile device.
C.
Applying a weak password for access to a mobile device.
Answers
D.
JoIIbreaking a locked smart device
D.
JoIIbreaking a locked smart device
Answers
Suggested answer: D

Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?

A.
At the value agreed upon by the partners.
A.
At the value agreed upon by the partners.
Answers
B.
At book value.
B.
At book value.
Answers
C.
At fair value
C.
At fair value
Answers
D.
At the original cost.
D.
At the original cost.
Answers
Suggested answer: D

Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?

A.
There is a greater need for organizations to rely on users to comply with policies and procedures.
A.
There is a greater need for organizations to rely on users to comply with policies and procedures.
Answers
B.
With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.
B.
With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.
Answers
C.
Incident response times are less critical in the BYOD environment, compared to a traditional environment
C.
Incident response times are less critical in the BYOD environment, compared to a traditional environment
Answers
D.
There is greater sharing of operational risk in a BYOD environment
D.
There is greater sharing of operational risk in a BYOD environment
Answers
Suggested answer: A

Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?

A.
Authorization
A.
Authorization
Answers
B.
Architecture model
B.
Architecture model
Answers
C.
Firewall
C.
Firewall
Answers
D.
Virtual private network
D.
Virtual private network
Answers
Suggested answer: C

According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

A.
The business continuity management charter.
A.
The business continuity management charter.
Answers
B.
The business continuity risk assessment plan.
B.
The business continuity risk assessment plan.
Answers
C.
The business Impact analysis plan
C.
The business Impact analysis plan
Answers
D.
The business case for business continuity planning
D.
The business case for business continuity planning
Answers
Suggested answer: C

Which of the following is an example of an application control?

A.
Automated password change requirements.
A.
Automated password change requirements.
Answers
B.
System data backup process.
B.
System data backup process.
Answers
C.
User testing of system changes.
C.
User testing of system changes.
Answers
D.
Formatted data fields
D.
Formatted data fields
Answers
Suggested answer: D

An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?

A.
The organization's operating expenses are increasing.
A.
The organization's operating expenses are increasing.
Answers
B.
The organization has adopted just-in-time inventory.
B.
The organization has adopted just-in-time inventory.
Answers
C.
The organization is experiencing Inventory theft
C.
The organization is experiencing Inventory theft
Answers
D.
The organization's inventory is overstated.
D.
The organization's inventory is overstated.
Answers
Suggested answer: B

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

A.
Direct, product costs.
A.
Direct, product costs.
Answers
B.
Indirect product costs.
B.
Indirect product costs.
Answers
C.
Direct period costs,
C.
Direct period costs,
Answers
D.
Indirect period costs
D.
Indirect period costs
Answers
Suggested answer: A
Total 340 questions
Go to page: of 34