ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 13

Question list
Search
Search

Related questions











Which of the following statements is true regarding data backup?

A.
System backups should always be performed real time.
A.
System backups should always be performed real time.
Answers
B.
Backups should be stored in a secured location onsite for easy access.
B.
Backups should be stored in a secured location onsite for easy access.
Answers
C.
The tape rotation schedule affects how long data is retained
C.
The tape rotation schedule affects how long data is retained
Answers
D.
Backup media should be restored only m case of a hardware or software failure
D.
Backup media should be restored only m case of a hardware or software failure
Answers
Suggested answer: C

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

A.
An extranet
A.
An extranet
Answers
B.
A local area network
B.
A local area network
Answers
C.
An Intranet
C.
An Intranet
Answers
D.
The internet
D.
The internet
Answers
Suggested answer: B

Which of the following principles s shared by both hierarchies and open organizational structures?

A.
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A.
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
Answers
B.
A supervisor's span of control should not exceed seven subordinates.
B.
A supervisor's span of control should not exceed seven subordinates.
Answers
C.
Responsibility should be accompanied by adequate authority.
C.
Responsibility should be accompanied by adequate authority.
Answers
D.
Employees at all levels should be empowered to make decisions.
D.
Employees at all levels should be empowered to make decisions.
Answers
E.
1 and 3 only
E.
1 and 3 only
Answers
F.
1 and 4 only
F.
1 and 4 only
Answers
G.
2 and 3 only
G.
2 and 3 only
Answers
H.
3 and 4 only
H.
3 and 4 only
Answers
Suggested answer: A

Which of the following would be a concern related to the authorization controls utilized for a system?

A.
Users can only see certain screens in the system.
A.
Users can only see certain screens in the system.
Answers
B.
Users are making frequent password change requests.
B.
Users are making frequent password change requests.
Answers
C.
Users Input Incorrect passwords and get denied system access
C.
Users Input Incorrect passwords and get denied system access
Answers
D.
Users are all permitted uniform access to the system.
D.
Users are all permitted uniform access to the system.
Answers
Suggested answer: A

What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?

A.
Export strategy.
A.
Export strategy.
Answers
B.
Transnational strategy
B.
Transnational strategy
Answers
C.
Multi-domestic strategy
C.
Multi-domestic strategy
Answers
D.
Globalization strategy
D.
Globalization strategy
Answers
Suggested answer: C

Which of the following is the best example of a compliance risk that Is likely to arise when adopting a bring-your-own-device (BYOD) policy?

A.
The risk that users try to bypass controls and do not install required software updates.
A.
The risk that users try to bypass controls and do not install required software updates.
Answers
B.
The risk that smart devices can be lost or stolen due to their mobile nature..
B.
The risk that smart devices can be lost or stolen due to their mobile nature..
Answers
C.
The risk that an organization intrusively monitors personal Information stored on smart devices.
C.
The risk that an organization intrusively monitors personal Information stored on smart devices.
Answers
D.
The risk that proprietary information is not deleted from the device when an employee leaves.
D.
The risk that proprietary information is not deleted from the device when an employee leaves.
Answers
Suggested answer: D

According to IIA guidance, which of the following best describes an adequate management (audit.) trail application control for the general ledger?

A.
Report identifying data that is outside of system parameters
A.
Report identifying data that is outside of system parameters
Answers
B.
Report identifying general ledger transactions by time and individual.
B.
Report identifying general ledger transactions by time and individual.
Answers
C.
Report comparing processing results with original Input
C.
Report comparing processing results with original Input
Answers
D.
Report confirming that the general ledger data was processed without error
D.
Report confirming that the general ledger data was processed without error
Answers
Suggested answer: B

During which phase of the contracting process ere contracts drafted for a proposed business activity?

A.
Initiation phase.
A.
Initiation phase.
Answers
B.
Bidding phase
B.
Bidding phase
Answers
C.
Development phase
C.
Development phase
Answers
D.
Management phase
D.
Management phase
Answers
Suggested answer: A

How do data analysis technologies affect internal audit testing?

A.
They improve the effectiveness of spot check testing techniques.
A.
They improve the effectiveness of spot check testing techniques.
Answers
B.
They allow greater insight into high risk areas.
B.
They allow greater insight into high risk areas.
Answers
C.
They reduce the overall scope of the audit engagement,
C.
They reduce the overall scope of the audit engagement,
Answers
D.
They increase the internal auditor's objectivity.
D.
They increase the internal auditor's objectivity.
Answers
Suggested answer: B

An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal Auditor be most concerned about?

A.
Compliance.
A.
Compliance.
Answers
B.
Privacy
B.
Privacy
Answers
C.
Strategic
C.
Strategic
Answers
D.
Physical security
D.
Physical security
Answers
Suggested answer: A
Total 340 questions
Go to page: of 34