ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?

A.
Using a jailbroken or rooted smart device feature.
A.
Using a jailbroken or rooted smart device feature.
Answers
B.
Using only smart devices previously approved by the organization.
B.
Using only smart devices previously approved by the organization.
Answers
C.
Obtaining written assurance from the employee that security policies and procedures are followed.
C.
Obtaining written assurance from the employee that security policies and procedures are followed.
Answers
D.
Introducing a security question known only by the employee.
D.
Introducing a security question known only by the employee.
Answers
Suggested answer: A

Which of the following sites would an Internet service provider most likely use to restore operations after its servers were damaged by a natural disaster?

A.
On site.
A.
On site.
Answers
B.
Cold site.
B.
Cold site.
Answers
C.
Hot site.
C.
Hot site.
Answers
D.
Warm site
D.
Warm site
Answers
Suggested answer: D

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?

A.
Firewall.
A.
Firewall.
Answers
B.
Encryption.
B.
Encryption.
Answers
C.
Antivirus.
C.
Antivirus.
Answers
D.
Biometrics.
D.
Biometrics.
Answers
Suggested answer: B

The budgeted cost of work performed is a metric best used to measure which project management activity?

A.
Resource planning.
A.
Resource planning.
Answers
B.
Cost estimating
B.
Cost estimating
Answers
C.
Cost budgeting.
C.
Cost budgeting.
Answers
D.
Cost control.
D.
Cost control.
Answers
Suggested answer: D

According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?

A.
Initiation.
A.
Initiation.
Answers
B.
Planning.
B.
Planning.
Answers
C.
Execution.
C.
Execution.
Answers
D.
Monitoring.
D.
Monitoring.
Answers
Suggested answer: B

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?

A.
Phishing.
A.
Phishing.
Answers
B.
Ransomware.
B.
Ransomware.
Answers
C.
Hacking.
C.
Hacking.
Answers
D.
Makvare
D.
Makvare
Answers
Suggested answer: D

Which of the following statements Is true regarding the use of centralized authority to govern an organization?

A.
Fraud committed through collusion is more likely when authority is centralized.
A.
Fraud committed through collusion is more likely when authority is centralized.
Answers
B.
Centralized managerial authority typically enhances certainty and consistency within an organization.
B.
Centralized managerial authority typically enhances certainty and consistency within an organization.
Answers
C.
When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
C.
When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
Answers
D.
Using separation of duties to mitigate collusion is reduced only when authority is centralized.
D.
Using separation of duties to mitigate collusion is reduced only when authority is centralized.
Answers
Suggested answer: B

Which of the following physical security controls is able to serve as both a detective and preventive control?

A.
Authentication logs.
A.
Authentication logs.
Answers
B.
Card key readers.
B.
Card key readers.
Answers
C.
Biometric devices
C.
Biometric devices
Answers
D.
Video surveillance.
D.
Video surveillance.
Answers
Suggested answer: D

When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?

A.
The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes.
A.
The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes.
Answers
B.
The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion.
B.
The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion.
Answers
C.
The risk that database administrators set up personalized accounts for themselves, making the audit time consuming.
C.
The risk that database administrators set up personalized accounts for themselves, making the audit time consuming.
Answers
D.
The risk that database administrators could make hidden changes using privileged access.
D.
The risk that database administrators could make hidden changes using privileged access.
Answers
Suggested answer: C

Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?

A.
Measure product performance against an established standard.
A.
Measure product performance against an established standard.
Answers
B.
Develop standard methods for performing established activities.
B.
Develop standard methods for performing established activities.
Answers
C.
Require the grouping of activities under a single manager.
C.
Require the grouping of activities under a single manager.
Answers
D.
Assign each employee a reasonable workload.
D.
Assign each employee a reasonable workload.
Answers
Suggested answer: D
Total 340 questions
Go to page: of 34