ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?

A.
Functional departmentalization.
A.
Functional departmentalization.
Answers
B.
Product departmentalization
B.
Product departmentalization
Answers
C.
Matrix organization.
C.
Matrix organization.
Answers
D.
Divisional organization
D.
Divisional organization
Answers
Suggested answer: C

Which of the following is a likely result of outsourcing?

A.
Increased dependence on suppliers.
A.
Increased dependence on suppliers.
Answers
B.
Increased importance of market strategy.
B.
Increased importance of market strategy.
Answers
C.
Decreased sensitivity to government regulation
C.
Decreased sensitivity to government regulation
Answers
D.
Decreased focus on costs
D.
Decreased focus on costs
Answers
Suggested answer: C

While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?

A.
Review the call center script used by customer service agents to interact with callers, and update the script if necessary.
A.
Review the call center script used by customer service agents to interact with callers, and update the script if necessary.
Answers
B.
Be-emphasize the importance of call center employees completing a certain number of calls per hour.
B.
Be-emphasize the importance of call center employees completing a certain number of calls per hour.
Answers
C.
Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.
C.
Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.
Answers
D.
Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily
D.
Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily
Answers
Suggested answer: A

A one-time password would most likely be generated in which of the following situations?

A.
When an employee accesses an online digital certificate
A.
When an employee accesses an online digital certificate
Answers
B.
When an employee's biometrics have been accepted.
B.
When an employee's biometrics have been accepted.
Answers
C.
When an employee creates a unique digital signature,
C.
When an employee creates a unique digital signature,
Answers
D.
When an employee uses a key fob to produce a token.
D.
When an employee uses a key fob to produce a token.
Answers
Suggested answer: D

Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?

A.
A warm recovery plan.
A.
A warm recovery plan.
Answers
B.
A cold recovery plan.
B.
A cold recovery plan.
Answers
C.
A hot recovery plan.
C.
A hot recovery plan.
Answers
D.
A manual work processes plan
D.
A manual work processes plan
Answers
Suggested answer: A

Which of the following is the best example of IT governance controls?

A.
Controls that focus on segregation of duties, financial, and change management,
A.
Controls that focus on segregation of duties, financial, and change management,
Answers
B.
Personnel policies that define and enforce conditions for staff in sensitive IT areas.
B.
Personnel policies that define and enforce conditions for staff in sensitive IT areas.
Answers
C.
Standards that support IT policies by more specifically defining required actions
C.
Standards that support IT policies by more specifically defining required actions
Answers
D.
Controls that focus on data structures and the minimum level of documentation required
D.
Controls that focus on data structures and the minimum level of documentation required
Answers
Suggested answer: C

Which of the following is a disadvantage in a centralized organizational structure?

A.
Communication conflicts
A.
Communication conflicts
Answers
B.
Slower decision making.
B.
Slower decision making.
Answers
C.
Loss of economies of scale
C.
Loss of economies of scale
Answers
D.
Vulnerabilities in sharing knowledge
D.
Vulnerabilities in sharing knowledge
Answers
Suggested answer: C

According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?

A.
Project portfolio.
A.
Project portfolio.
Answers
B.
Project development
B.
Project development
Answers
C.
Project governance.
C.
Project governance.
Answers
D.
Project management methodologies
D.
Project management methodologies
Answers
Suggested answer: C

Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?

A.
Nondisclosure agreements between the firm and its employees.
A.
Nondisclosure agreements between the firm and its employees.
Answers
B.
Logs of user activity within the information system.
B.
Logs of user activity within the information system.
Answers
C.
Two-factor authentication for access into the information system.
C.
Two-factor authentication for access into the information system.
Answers
D.
limited access so information, based on employee duties
D.
limited access so information, based on employee duties
Answers
Suggested answer: D

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

A.
Session hijacking.
A.
Session hijacking.
Answers
B.
Jailbreaking
B.
Jailbreaking
Answers
C.
Eavesdropping,
C.
Eavesdropping,
Answers
D.
Authentication.
D.
Authentication.
Answers
Suggested answer: B
Total 340 questions
Go to page: of 34