ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Which of the following performance measures includes both profits and investment base?

A.
Residual income
A.
Residual income
Answers
B.
A flexible budget
B.
A flexible budget
Answers
C.
Variance analysis.
C.
Variance analysis.
Answers
D.
A contribution margin income statement by segment.
D.
A contribution margin income statement by segment.
Answers
Suggested answer: C

At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?

A.
Cost of goods sold will be understated and net income will be overstated.
A.
Cost of goods sold will be understated and net income will be overstated.
Answers
B.
Cost of goods sold will be overstated and net income will be understated
B.
Cost of goods sold will be overstated and net income will be understated
Answers
C.
Cost of goods sold will be understated and there Wi-Fi be no impact on net income.
C.
Cost of goods sold will be understated and there Wi-Fi be no impact on net income.
Answers
D.
There will be no impact on cost of goods sold and net income will be overstated
D.
There will be no impact on cost of goods sold and net income will be overstated
Answers
Suggested answer: B

With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?

A.
Inventory of information assets
A.
Inventory of information assets
Answers
B.
Limited sharing of data files with external parties.
B.
Limited sharing of data files with external parties.
Answers
C.
Vulnerability assessment
C.
Vulnerability assessment
Answers
D.
Clearly defined policies
D.
Clearly defined policies
Answers
Suggested answer: C

Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?

A.
Articulation of the data
A.
Articulation of the data
Answers
B.
Availability of the data.
B.
Availability of the data.
Answers
C.
Measurability of the data
C.
Measurability of the data
Answers
D.
Relevance of the data.
D.
Relevance of the data.
Answers
Suggested answer: D

In accounting, which of the following statements is true regarding the terms debit and credit?

A.
Debit indicates the right side of an account and credit the left side
A.
Debit indicates the right side of an account and credit the left side
Answers
B.
Debit means an increase in an account and credit means a decrease.
B.
Debit means an increase in an account and credit means a decrease.
Answers
C.
Credit indicates the right side of an account and debit the left side.
C.
Credit indicates the right side of an account and debit the left side.
Answers
D.
Credit means an increase in an account and debit means a decrease
D.
Credit means an increase in an account and debit means a decrease
Answers
Suggested answer: D

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?

A.
Monitoring network traffic.
A.
Monitoring network traffic.
Answers
B.
Using whitelists and blacklists to manage network traffic.
B.
Using whitelists and blacklists to manage network traffic.
Answers
C.
Restricting access and blocking unauthorized access to the network
C.
Restricting access and blocking unauthorized access to the network
Answers
D.
Educating employees throughout the company to recognize phishing attacks.
D.
Educating employees throughout the company to recognize phishing attacks.
Answers
Suggested answer: D

Which of the following statements is true regarding change management?

A.
The degree of risk associated with a proposed change determines whether the change request requires authorization
A.
The degree of risk associated with a proposed change determines whether the change request requires authorization
Answers
B.
Program changes generally are developed and tested in the production environment.
B.
Program changes generally are developed and tested in the production environment.
Answers
C.
Changes are only required by software programs
C.
Changes are only required by software programs
Answers
D.
To protect the production environment, changes must be managed in a repeatable, defined, and predictable manner
D.
To protect the production environment, changes must be managed in a repeatable, defined, and predictable manner
Answers
Suggested answer: D

Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?

A.
Decentralized
A.
Decentralized
Answers
B.
Centralized
B.
Centralized
Answers
C.
Departmentalized
C.
Departmentalized
Answers
D.
Tall structure
D.
Tall structure
Answers
Suggested answer: A

An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?

A.
Cost of sales increased relative to sales.
A.
Cost of sales increased relative to sales.
Answers
B.
Total sales increased relative to expenses.
B.
Total sales increased relative to expenses.
Answers
C.
The organization had a higher dividend payout rate in year two.
C.
The organization had a higher dividend payout rate in year two.
Answers
D.
The government increased the corporate tax rate
D.
The government increased the corporate tax rate
Answers
Suggested answer: D

Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?

A.
UDAs arid traditional JT applications typically follow a similar development life cycle
A.
UDAs arid traditional JT applications typically follow a similar development life cycle
Answers
B.
A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.
B.
A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.
Answers
C.
Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.
C.
Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.
Answers
D.
IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.
D.
IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.
Answers
Suggested answer: C
Total 340 questions
Go to page: of 34