IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 27

List of questions
Question 261

A multinational organization allows its employees to access work email via personal smart devices.
However, users are required to consent to the installation of mobile device management (MDM) software that will remotely wipe data in case of theft or other incidents. Which of the following should the organization ensure in exchange for the employees' consent?
Question 262

An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?
Question 263

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?
Question 264

During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?
Question 265

According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Question 266

Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?
Question 267

A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?
Question 268

Which of the following is an example of a contingent liability that a company should record?
Question 269

Which of the following networks is suitable for an organization that has operations In multiple cities and countries?
Question 270

An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?
Question