ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a systems software control?

A.
Restricting server room access to specific individuals
A.
Restricting server room access to specific individuals
Answers
B.
Housing servers with sensitive software away from environmental hazards
B.
Housing servers with sensitive software away from environmental hazards
Answers
C.
Ensuring that all user requirements are documented
C.
Ensuring that all user requirements are documented
Answers
D.
Performing of intrusion testing on a regular basis
D.
Performing of intrusion testing on a regular basis
Answers
Suggested answer: D

Which of the following statements is true regarding cost-volume-profit analysis?

A.
Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.
A.
Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.
Answers
B.
Breakeven point is the amount of units sold to cover variable costs.
B.
Breakeven point is the amount of units sold to cover variable costs.
Answers
C.
Breakeven occurs when the contribution margin covers fixed costs.
C.
Breakeven occurs when the contribution margin covers fixed costs.
Answers
D.
Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.
D.
Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.
Answers
Suggested answer: C

Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

A.
High-yield bonds
A.
High-yield bonds
Answers
B.
Commodity-backed bonds
B.
Commodity-backed bonds
Answers
C.
Zero coupon bonds
C.
Zero coupon bonds
Answers
D.
Junk bonds
D.
Junk bonds
Answers
Suggested answer: C

An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?

A.
Data is synchronized in real time
A.
Data is synchronized in real time
Answers
B.
Recovery time is expected to be less than one week
B.
Recovery time is expected to be less than one week
Answers
C.
Servers are not available and need to be procured
C.
Servers are not available and need to be procured
Answers
D.
Recovery resources end data restore processes have not been defined.
D.
Recovery resources end data restore processes have not been defined.
Answers
Suggested answer: C

An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety

The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

A.
Average cost method
A.
Average cost method
Answers
B.
First-in, first-out (FIFO) method
B.
First-in, first-out (FIFO) method
Answers
C.
Specific identification method
C.
Specific identification method
Answers
D.
Activity-based costing method
D.
Activity-based costing method
Answers
Suggested answer: A

According to Herzberg's Two-Factor Theory of Motivation, which of the following factors arc mentioned most often by satisfied employees?

A.
Salary and status
A.
Salary and status
Answers
B.
Responsibility and advancement
B.
Responsibility and advancement
Answers
C.
Work conditions and security
C.
Work conditions and security
Answers
D.
Peer relationships and personal life
D.
Peer relationships and personal life
Answers
Suggested answer: B

Which of the following statements is true regarding the management-by-objectives method?

A.
Management by objectives is most helpful in organizations that have rapid changes.
A.
Management by objectives is most helpful in organizations that have rapid changes.
Answers
B.
Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.
B.
Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.
Answers
C.
Management by objectives helps organizations to keep employees motivated.
C.
Management by objectives helps organizations to keep employees motivated.
Answers
D.
Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.
D.
Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.
Answers
Suggested answer: C

Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

A.
Requested backup tapes were not returned from the offsite vendor In a timely manner.
A.
Requested backup tapes were not returned from the offsite vendor In a timely manner.
Answers
B.
Returned backup tapes from the offsite vendor contained empty spaces.
B.
Returned backup tapes from the offsite vendor contained empty spaces.
Answers
C.
Critical systems have boon backed up more frequently than required.
C.
Critical systems have boon backed up more frequently than required.
Answers
D.
Critical system backup tapes are taken off site less frequently than required
D.
Critical system backup tapes are taken off site less frequently than required
Answers
Suggested answer: D

Which of the following statements. Is most accurate concerning the management and audit of a web server?

A.
The file transfer protocol (FTP) should always be enabled.
A.
The file transfer protocol (FTP) should always be enabled.
Answers
B.
The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.
B.
The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.
Answers
C.
The number of ports and protocols allowed to access the web server should be maximized.
C.
The number of ports and protocols allowed to access the web server should be maximized.
Answers
D.
Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTPor FTP.
D.
Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTPor FTP.
Answers
Suggested answer: D

According to IIA guidance, which of the following statements is true with regard to workstation computers that access company Information stored on the network?

A.
Individual workstation computer controls are not as important as companywide server controls.
A.
Individual workstation computer controls are not as important as companywide server controls.
Answers
B.
Particular attention should be paid to housing workstations away from environmental hazards.
B.
Particular attention should be paid to housing workstations away from environmental hazards.
Answers
C.
Cyber security issues can be controlled at an enterprise level, making workstation level controls redundant.
C.
Cyber security issues can be controlled at an enterprise level, making workstation level controls redundant.
Answers
D.
With security risks near an all-time high, workstations should not be connected to the company network.
D.
With security risks near an all-time high, workstations should not be connected to the company network.
Answers
Suggested answer: C
Total 340 questions
Go to page: of 34