ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?

A.
Market analysis lo identify trends
A.
Market analysis lo identify trends
Answers
B.
Services to manage and maintain the IT Infrastructure.
B.
Services to manage and maintain the IT Infrastructure.
Answers
C.
Backup and restoration.
C.
Backup and restoration.
Answers
D.
Software testing and validation
D.
Software testing and validation
Answers
Suggested answer: D

At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?

A.
Project plan development.
A.
Project plan development.
Answers
B.
Project plan execution
B.
Project plan execution
Answers
C.
Integrated change control.
C.
Integrated change control.
Answers
D.
Project quality planning
D.
Project quality planning
Answers
Suggested answer: A

Which of the following is a limitation of the remote wipe for a smart device?

A.
Encrypted data cannot be locked to prevent further access
A.
Encrypted data cannot be locked to prevent further access
Answers
B.
Default settings cannot be restored on the device.
B.
Default settings cannot be restored on the device.
Answers
C.
All data, cannot be completely removed from the device
C.
All data, cannot be completely removed from the device
Answers
D.
Mobile device management software is required for successful remote wipe
D.
Mobile device management software is required for successful remote wipe
Answers
Suggested answer: D

Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?

A.
Internal auditors perform reconciliation procedures to support an external audit of financial reporting.
A.
Internal auditors perform reconciliation procedures to support an external audit of financial reporting.
Answers
B.
Internal auditors perform a systems-focused analysis to review relevant controls.
B.
Internal auditors perform a systems-focused analysis to review relevant controls.
Answers
C.
Internal auditors perform a risk assessment to identify potential audit subjects as input for the annual internal audit plan
C.
Internal auditors perform a risk assessment to identify potential audit subjects as input for the annual internal audit plan
Answers
D.
Internal auditors test IT general controls with regard to operating effectiveness versus design
D.
Internal auditors test IT general controls with regard to operating effectiveness versus design
Answers
Suggested answer: C

Which of the following performance measures disincentives engaging in earnings management?

A.
Linking performance to profitability measures such as return on investment.
A.
Linking performance to profitability measures such as return on investment.
Answers
B.
Linking performance to the stock price.
B.
Linking performance to the stock price.
Answers
C.
Linking performance to quotas such as units produced.
C.
Linking performance to quotas such as units produced.
Answers
D.
Linking performance to nonfinancial measures such as customer satisfaction and employees training
D.
Linking performance to nonfinancial measures such as customer satisfaction and employees training
Answers
Suggested answer: A

While conducting' audit procedures at the organization's data center an internal auditor noticed the following:

- Backup media was located on data center shelves.

- Backup media was organized by date.

- Backup schedule was one week in duration.

The system administrator was able to present restore logs.

Which of the following is reasonable for the internal auditor to conclude?

A.
Backup media is not properly stored, as the storage facility should be off-site.
A.
Backup media is not properly stored, as the storage facility should be off-site.
Answers
B.
Backup procedures are adequate and appropriate according to best practices.
B.
Backup procedures are adequate and appropriate according to best practices.
Answers
C.
Backup media is not properly indexed, as backup media should be indexed by system, not date.
C.
Backup media is not properly indexed, as backup media should be indexed by system, not date.
Answers
D.
Backup schedule is not sufficient, as full backup should be conducted daily.
D.
Backup schedule is not sufficient, as full backup should be conducted daily.
Answers
Suggested answer: A

Following an evaluation of an organization's IT controls, an internal auditor suggested improving the process where results are compared against the input. Which of the following IT controls would the Internal auditor recommend?

A.
Output controls.
A.
Output controls.
Answers
B.
Input controls
B.
Input controls
Answers
C.
Processing controls.
C.
Processing controls.
Answers
D.
Integrity controls.
D.
Integrity controls.
Answers
Suggested answer: C

Which of the following best describes a potential benefit of using data analyses?

A.
It easily aligns with existing internal audit competencies to reduce expenses
A.
It easily aligns with existing internal audit competencies to reduce expenses
Answers
B.
It provides a more holistic view of the audited area.
B.
It provides a more holistic view of the audited area.
Answers
C.
Its outcomes can be easily interpreted into audit: conclusions.
C.
Its outcomes can be easily interpreted into audit: conclusions.
Answers
D.
Its application increases internal auditors' adherence to the Standards
D.
Its application increases internal auditors' adherence to the Standards
Answers
Suggested answer: C

A third party who provides payroll services to the organization was asked to create audit or "readonly 1 functionalities in their systems. Which of the following statements is true regarding this request?

A.
This will support execution of the right-to-audit clause.
A.
This will support execution of the right-to-audit clause.
Answers
B.
This will enforce robust risk assessment practices
B.
This will enforce robust risk assessment practices
Answers
C.
This will address cybersecurity considerations and concerns.
C.
This will address cybersecurity considerations and concerns.
Answers
D.
This will enhance the third party's ability to apply data analytics
D.
This will enhance the third party's ability to apply data analytics
Answers
Suggested answer: C

Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?

A.
Cash payback technique
A.
Cash payback technique
Answers
B.
Annual rate of return technique.
B.
Annual rate of return technique.
Answers
C.
Internal rate of return method.
C.
Internal rate of return method.
Answers
D.
Net present value method.
D.
Net present value method.
Answers
Suggested answer: A
Total 340 questions
Go to page: of 34