ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?

A.
The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.
A.
The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.
Answers
B.
Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
B.
Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
Answers
C.
Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
C.
Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
Answers
D.
Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
D.
Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
Answers
Suggested answer: A

At one organization, the specific terms of a contract require both the promisor and promisee to sign the contract in the presence of an independent witness. What is the primary role to the witness to these signatures?

A.
A witness verifies the quantities of the copies signed.
A.
A witness verifies the quantities of the copies signed.
Answers
B.
A witness verifies that the contract was signed with the free consent of the promisor and promisee.
B.
A witness verifies that the contract was signed with the free consent of the promisor and promisee.
Answers
C.
A witness ensures the completeness of the contract between the promisor and promisee.
C.
A witness ensures the completeness of the contract between the promisor and promisee.
Answers
D.
A witness validates that the signatures on the contract were signed by the promisor and promisee.
D.
A witness validates that the signatures on the contract were signed by the promisor and promisee.
Answers
Suggested answer: D

An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?

A.
Normalize the data,
A.
Normalize the data,
Answers
B.
Obtain the data
B.
Obtain the data
Answers
C.
Identify the risks.
C.
Identify the risks.
Answers
D.
Analyze the data.
D.
Analyze the data.
Answers
Suggested answer: C

Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?

A.
The organization sells inventory to an overseas subsidiary at fair value.
A.
The organization sells inventory to an overseas subsidiary at fair value.
Answers
B.
The local subsidiary purchases inventory at a discounted price.
B.
The local subsidiary purchases inventory at a discounted price.
Answers
C.
The organization sells inventory to an overseas subsidiary at the original cost.
C.
The organization sells inventory to an overseas subsidiary at the original cost.
Answers
D.
The local subsidiary purchases inventory at the depreciated cost.
D.
The local subsidiary purchases inventory at the depreciated cost.
Answers
Suggested answer: C

Which of the following statements is true regarding user-developed applications (UDAs)?

A.
UDAs are less flexible and more difficult to configure than traditional IT applications.
A.
UDAs are less flexible and more difficult to configure than traditional IT applications.
Answers
B.
Updating UDAs may lead to various errors resulting from changes or corrections.
B.
Updating UDAs may lead to various errors resulting from changes or corrections.
Answers
C.
UDAs typically are subjected to application development and change management controls.
C.
UDAs typically are subjected to application development and change management controls.
Answers
D.
Using UDAs typically enhances the organization's ability to comply with regulatory factors.
D.
Using UDAs typically enhances the organization's ability to comply with regulatory factors.
Answers
Suggested answer: B

Which of the following represents a basis for consolidation under the International Financial Reporting Standards?

A.
Variable entity approach.
A.
Variable entity approach.
Answers
B.
Control ownership.
B.
Control ownership.
Answers
C.
Risk and reward.
C.
Risk and reward.
Answers
D.
Voting interest.
D.
Voting interest.
Answers
Suggested answer: A

Which of the following scenarios best illustrates a spear phishing attack?

A.
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
A.
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
Answers
B.
A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.
B.
A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.
Answers
C.
A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.
C.
A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.
Answers
D.
Many users of a social network service received fake notifications of a unique opportunity to invest in a new product
D.
Many users of a social network service received fake notifications of a unique opportunity to invest in a new product
Answers
Suggested answer: C

An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?

A.
Face or finger recognition equipment,
A.
Face or finger recognition equipment,
Answers
B.
Radiofrequency identification chips to authenticate employees with cards.
B.
Radiofrequency identification chips to authenticate employees with cards.
Answers
C.
A requirement to clock in and clock out with a unique personal identification number.
C.
A requirement to clock in and clock out with a unique personal identification number.
Answers
D.
A combination of a smart card and a password to clock in and clock out.
D.
A combination of a smart card and a password to clock in and clock out.
Answers
Suggested answer: D

Which of the following best describes owner's equity?

A.
Assets minus liabilities.
A.
Assets minus liabilities.
Answers
B.
Total assets.
B.
Total assets.
Answers
C.
Total liabilities.
C.
Total liabilities.
Answers
D.
Owners contribution plus drawings.
D.
Owners contribution plus drawings.
Answers
Suggested answer: A

Which of the following describes a mechanistic organizational structure?

A.
Primary direction of communication tends to be lateral.
A.
Primary direction of communication tends to be lateral.
Answers
B.
Definition of assigned tasks tends to be broad and general.
B.
Definition of assigned tasks tends to be broad and general.
Answers
C.
Type of knowledge required tends to be broad and professional.
C.
Type of knowledge required tends to be broad and professional.
Answers
D.
Reliance on self-control tends to be low.
D.
Reliance on self-control tends to be low.
Answers
Suggested answer: D
Total 340 questions
Go to page: of 34