ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 17

Question list
Search
Search

Related questions











An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?

A.
Decrease the transfer price
A.
Decrease the transfer price
Answers
B.
Increase the transfer price
B.
Increase the transfer price
Answers
C.
Charge at the arm's length price
C.
Charge at the arm's length price
Answers
D.
Charge at the optimal transfer price
D.
Charge at the optimal transfer price
Answers
Suggested answer: A

Which of the following best explains why an organization would enter into a capital lease contract?

A.
To increase the ability to borrow additional funds from creditors
A.
To increase the ability to borrow additional funds from creditors
Answers
B.
To reduce the organization's free cash flow from operations
B.
To reduce the organization's free cash flow from operations
Answers
C.
To Improve the organization's free cash flow from operations
C.
To Improve the organization's free cash flow from operations
Answers
D.
To acquire the asset at the end of the lease period at a price lower than the fair market value
D.
To acquire the asset at the end of the lease period at a price lower than the fair market value
Answers
Suggested answer: C

When using data analytics during a review of the procurement process, what is the first step in the analysis process?

A.
Identify data anomalies and outliers.
A.
Identify data anomalies and outliers.
Answers
B.
Define questions to be answered.
B.
Define questions to be answered.
Answers
C.
Identify data sources available.
C.
Identify data sources available.
Answers
D.
Determine the scope of the data extract
D.
Determine the scope of the data extract
Answers
Suggested answer: C

Which of the following responsibilities would ordinary fall under the help desk function of an organization?

A.
Maintenance service items such as production support.
A.
Maintenance service items such as production support.
Answers
B.
Management of infrastructure services, including network management.
B.
Management of infrastructure services, including network management.
Answers
C.
Physical hosting of mainframes and distributed servers
C.
Physical hosting of mainframes and distributed servers
Answers
D.
End-to -end security architecture design.
D.
End-to -end security architecture design.
Answers
Suggested answer: B

Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?

A.
It calculates the overall value of a project.
A.
It calculates the overall value of a project.
Answers
B.
It ignores the time value of money.
B.
It ignores the time value of money.
Answers
C.
It calculates the time a project takes to break even.
C.
It calculates the time a project takes to break even.
Answers
D.
It begins at time zero for the project.
D.
It begins at time zero for the project.
Answers
Suggested answer: C

Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?

A.
Anti-malware software
A.
Anti-malware software
Answers
B.
Authentication
B.
Authentication
Answers
C.
Spyware
C.
Spyware
Answers
D.
Rooting
D.
Rooting
Answers
Suggested answer: B

Which of the following is true of matrix organizations?

A.
A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.
A.
A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.
Answers
B.
A combination of product and functional departments allows management to utilize personnel from various Junctions.
B.
A combination of product and functional departments allows management to utilize personnel from various Junctions.
Answers
C.
Authority, responsibility and accountability of the units Involved may vary based on the project's life, or the organization's culture
C.
Authority, responsibility and accountability of the units Involved may vary based on the project's life, or the organization's culture
Answers
D.
It is best suited for firms with scattered locations or for multi-line, Large-scale firms.
D.
It is best suited for firms with scattered locations or for multi-line, Large-scale firms.
Answers
Suggested answer: B

Which of the following scenarios best illustrates a spear phishing attack?

A.
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
A.
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
Answers
B.
A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.
B.
A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.
Answers
C.
A person received a personalized email regarding a golf membership renewal, and he click a hyperlink to enter his credit card data into a fake website
C.
A person received a personalized email regarding a golf membership renewal, and he click a hyperlink to enter his credit card data into a fake website
Answers
D.
Many users of a social network service received fake notifications of e unique opportunity to invest in a new product.
D.
Many users of a social network service received fake notifications of e unique opportunity to invest in a new product.
Answers
Suggested answer: C

Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?

A.
Job complicating
A.
Job complicating
Answers
B.
Job rotation
B.
Job rotation
Answers
C.
Job enrichment
C.
Job enrichment
Answers
D.
Job enlargement
D.
Job enlargement
Answers
Suggested answer: C

Which of the following techniques would best detect on inventory fraud scheme?

A.
Analyze invoice payments just under individual authorization limits.
A.
Analyze invoice payments just under individual authorization limits.
Answers
B.
Analyze stratification of inventory adjustments by warehouse location.
B.
Analyze stratification of inventory adjustments by warehouse location.
Answers
C.
Analyze Inventory Invoice amounts and compare with approved contract amounts.
C.
Analyze Inventory Invoice amounts and compare with approved contract amounts.
Answers
D.
Analyze differences discovered curing duplicate payment testing.
D.
Analyze differences discovered curing duplicate payment testing.
Answers
Suggested answer: C
Total 340 questions
Go to page: of 34