ExamGecko
Home / IIA / IIA-CIA-Part3 / List of questions
Ask Question

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

Which of the following statements is true regarding data backup?

System backups should always be performed real time.
System backups should always be performed real time.
Backups should be stored in a secured location onsite for easy access.
Backups should be stored in a secured location onsite for easy access.
The tape rotation schedule affects how long data is retained
The tape rotation schedule affects how long data is retained
Backup media should be restored only m case of a hardware or software failure
Backup media should be restored only m case of a hardware or software failure
Suggested answer: C
asked 18/09/2024
Fabio Todeschin
44 questions

Question 122

Report Export Collapse

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

An extranet
An extranet
A local area network
A local area network
An Intranet
An Intranet
The internet
The internet
Suggested answer: B
asked 18/09/2024
Emanuel Popescu
42 questions

Question 123

Report Export Collapse

Which of the following principles s shared by both hierarchies and open organizational structures?

A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A supervisor's span of control should not exceed seven subordinates.
A supervisor's span of control should not exceed seven subordinates.
Responsibility should be accompanied by adequate authority.
Responsibility should be accompanied by adequate authority.
Employees at all levels should be empowered to make decisions.
Employees at all levels should be empowered to make decisions.
1 and 3 only
1 and 3 only
1 and 4 only
1 and 4 only
2 and 3 only
2 and 3 only
3 and 4 only
3 and 4 only
Suggested answer: A
asked 18/09/2024
Caridade Martins
49 questions

Question 124

Report Export Collapse

Which of the following would be a concern related to the authorization controls utilized for a system?

Users can only see certain screens in the system.
Users can only see certain screens in the system.
Users are making frequent password change requests.
Users are making frequent password change requests.
Users Input Incorrect passwords and get denied system access
Users Input Incorrect passwords and get denied system access
Users are all permitted uniform access to the system.
Users are all permitted uniform access to the system.
Suggested answer: A
asked 18/09/2024
Mark Arnold Santos
48 questions

Question 125

Report Export Collapse

What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?

Export strategy.
Export strategy.
Transnational strategy
Transnational strategy
Multi-domestic strategy
Multi-domestic strategy
Globalization strategy
Globalization strategy
Suggested answer: C
asked 18/09/2024
ali ghoubali
41 questions

Question 126

Report Export Collapse

Which of the following is the best example of a compliance risk that Is likely to arise when adopting a bring-your-own-device (BYOD) policy?

The risk that users try to bypass controls and do not install required software updates.
The risk that users try to bypass controls and do not install required software updates.
The risk that smart devices can be lost or stolen due to their mobile nature..
The risk that smart devices can be lost or stolen due to their mobile nature..
The risk that an organization intrusively monitors personal Information stored on smart devices.
The risk that an organization intrusively monitors personal Information stored on smart devices.
The risk that proprietary information is not deleted from the device when an employee leaves.
The risk that proprietary information is not deleted from the device when an employee leaves.
Suggested answer: D
asked 18/09/2024
saiming wong
42 questions

Question 127

Report Export Collapse

According to IIA guidance, which of the following best describes an adequate management (audit.) trail application control for the general ledger?

Report identifying data that is outside of system parameters
Report identifying data that is outside of system parameters
Report identifying general ledger transactions by time and individual.
Report identifying general ledger transactions by time and individual.
Report comparing processing results with original Input
Report comparing processing results with original Input
Report confirming that the general ledger data was processed without error
Report confirming that the general ledger data was processed without error
Suggested answer: B
asked 18/09/2024
Stian Godoe
49 questions

Question 128

Report Export Collapse

During which phase of the contracting process ere contracts drafted for a proposed business activity?

Initiation phase.
Initiation phase.
Bidding phase
Bidding phase
Development phase
Development phase
Management phase
Management phase
Suggested answer: A
asked 18/09/2024
Tarun Sharma
51 questions

Question 129

Report Export Collapse

How do data analysis technologies affect internal audit testing?

They improve the effectiveness of spot check testing techniques.
They improve the effectiveness of spot check testing techniques.
They allow greater insight into high risk areas.
They allow greater insight into high risk areas.
They reduce the overall scope of the audit engagement,
They reduce the overall scope of the audit engagement,
They increase the internal auditor's objectivity.
They increase the internal auditor's objectivity.
Suggested answer: B
asked 18/09/2024
Adnan Safdar
39 questions

Question 130

Report Export Collapse

An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal Auditor be most concerned about?

Compliance.
Compliance.
Privacy
Privacy
Strategic
Strategic
Physical security
Physical security
Suggested answer: A
asked 18/09/2024
Opeyemi Oguntodu
43 questions
Total 340 questions
Go to page: of 34

Related questions