ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











A multinational organization allows its employees to access work email via personal smart devices.

However, users are required to consent to the installation of mobile device management (MDM) software that will remotely wipe data in case of theft or other incidents. Which of the following should the organization ensure in exchange for the employees' consent?

A.
That those employees who do not consent to MDM software cannot have an email account.
A.
That those employees who do not consent to MDM software cannot have an email account.
Answers
B.
That personal data on the device cannot be accessed and deleted by system administrators.
B.
That personal data on the device cannot be accessed and deleted by system administrators.
Answers
C.
That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.
C.
That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.
Answers
D.
That employee consent includes appropriate waivers regarding potential breaches to their privacy.
D.
That employee consent includes appropriate waivers regarding potential breaches to their privacy.
Answers
Suggested answer: B

An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?

A.
Horizontal analysis
A.
Horizontal analysis
Answers
B.
Vertical analysis
B.
Vertical analysis
Answers
C.
Ratio analysis
C.
Ratio analysis
Answers
D.
Trend analysis
D.
Trend analysis
Answers
Suggested answer: B

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?

A.
Boundary defense
A.
Boundary defense
Answers
B.
Malware defense.
B.
Malware defense.
Answers
C.
Penetration tests
C.
Penetration tests
Answers
D.
Wireless access controls
D.
Wireless access controls
Answers
Suggested answer: C

During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?

A.
The maximum tolerable downtime after the occurrence of an incident.
A.
The maximum tolerable downtime after the occurrence of an incident.
Answers
B.
The maximum tolerable data loss after the occurrence of an incident.
B.
The maximum tolerable data loss after the occurrence of an incident.
Answers
C.
The maximum tolerable risk related to the occurrence of an incident
C.
The maximum tolerable risk related to the occurrence of an incident
Answers
D.
The minimum recovery resources needed after the occurrence of an incident
D.
The minimum recovery resources needed after the occurrence of an incident
Answers
Suggested answer: B

According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?

A.
Relationship with supervisor
A.
Relationship with supervisor
Answers
B.
Salary
B.
Salary
Answers
C.
Security.
C.
Security.
Answers
D.
Achievement
D.
Achievement
Answers
Suggested answer: D

Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?

A.
Data center operations manager
A.
Data center operations manager
Answers
B.
Response and support team.
B.
Response and support team.
Answers
C.
Database administrator,
C.
Database administrator,
Answers
D.
Network administrator
D.
Network administrator
Answers
Suggested answer: D

A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?

A.
The company's code of ethics.
A.
The company's code of ethics.
Answers
B.
The third-party management risk register.
B.
The third-party management risk register.
Answers
C.
The signed service-level agreement.
C.
The signed service-level agreement.
Answers
D.
The subcontractors' annual satisfaction survey.
D.
The subcontractors' annual satisfaction survey.
Answers
Suggested answer: C

Which of the following is an example of a contingent liability that a company should record?

A.
A potential assessment of additional income tax.
A.
A potential assessment of additional income tax.
Answers
B.
Possible product warranty costs.
B.
Possible product warranty costs.
Answers
C.
The threat of a lawsuit by a competitor.
C.
The threat of a lawsuit by a competitor.
Answers
D.
The remote possibility of a contract breach.
D.
The remote possibility of a contract breach.
Answers
Suggested answer: C

Which of the following networks is suitable for an organization that has operations In multiple cities and countries?

A.
Wide area network.
A.
Wide area network.
Answers
B.
Local area network
B.
Local area network
Answers
C.
Metropolitan area network.
C.
Metropolitan area network.
Answers
D.
Storage area network.
D.
Storage area network.
Answers
Suggested answer: A

An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?

A.
Required documentation of process for discontinuing use of the devices
A.
Required documentation of process for discontinuing use of the devices
Answers
B.
Required removal of personal pictures and contacts.
B.
Required removal of personal pictures and contacts.
Answers
C.
Required documentation of expiration of contract with service provider.
C.
Required documentation of expiration of contract with service provider.
Answers
D.
Required sign-off on conflict of interest statement.
D.
Required sign-off on conflict of interest statement.
Answers
Suggested answer: A
Total 340 questions
Go to page: of 34