ExamGecko
Home / IIA / IIA-CIA-Part3 / List of questions
Ask Question

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

When determining the level of physical controls required for a workstation, which of the following factors should be considered?

Ease of use.
Ease of use.
Value to the business.
Value to the business.
Intrusion prevention.
Intrusion prevention.
Ergonomic model.
Ergonomic model.
Suggested answer: B
asked 18/09/2024
Pooja Pendyala
41 questions

Question 22

Report Export Collapse

During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?

Intrinsic reward.
Intrinsic reward.
Job enrichment
Job enrichment
Extrinsic reward.
Extrinsic reward.
The hierarchy of needs.
The hierarchy of needs.
Suggested answer: C
asked 18/09/2024
Amir Arefi
37 questions

Question 23

Report Export Collapse

During an audit of the payroll system, the internal auditor identifies and documents the following condition:

"Once a user is logged into the system, the user has access to all functionality within the system." What is the most likely root cause for tins issue?

The authentication process relies on a simple password only, which is a weak method of authorization.
The authentication process relies on a simple password only, which is a weak method of authorization.
The system authorization of the user does not correctly reflect the access rights intended.
The system authorization of the user does not correctly reflect the access rights intended.
There was no periodic review to validate access rights.
There was no periodic review to validate access rights.
The application owner apparently did not approve the access request during the provisioning process.
The application owner apparently did not approve the access request during the provisioning process.
Suggested answer: B
asked 18/09/2024
Louis Reeves
53 questions

Question 24

Report Export Collapse

Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?

Variety.
Variety.
Velocity.
Velocity.
Volume.
Volume.
Veracity.
Veracity.
Suggested answer: D
asked 18/09/2024
So young Jang
33 questions

Question 25

Report Export Collapse

Which of the following lists best describes the classification of manufacturing costs?

Direct materials, indirect materials, raw materials.
Direct materials, indirect materials, raw materials.
Overhead costs, direct labor, direct materials.
Overhead costs, direct labor, direct materials.
Direct materials, direct labor, depreciation on factory buildings.
Direct materials, direct labor, depreciation on factory buildings.
Raw materials, factory employees' wages, production selling expenses.
Raw materials, factory employees' wages, production selling expenses.
Suggested answer: B
asked 18/09/2024
SAM E REYES
42 questions

Question 26

Report Export Collapse

Which of the following is an effective preventive control for data center security?

Motion detectors.
Motion detectors.
Key card access to the facility.
Key card access to the facility.
Security cameras.
Security cameras.
Monitoring access to data center workstations
Monitoring access to data center workstations
Suggested answer: B
asked 18/09/2024
Vijay Khara
50 questions

Question 27

Report Export Collapse

According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?

Install and update anti-virus software.
Install and update anti-virus software.
Implement data encryption techniques.
Implement data encryption techniques.
Set data availability by user need.
Set data availability by user need.
Upgrade firewall configuration
Upgrade firewall configuration
Suggested answer: C
asked 18/09/2024
Donn Policarpio
48 questions

Question 28

Report Export Collapse

Which of the following data security policies is most likely to be the result of a data privacy law?

Access to personally identifiable information is limited to those who need It to perform their job.
Access to personally identifiable information is limited to those who need It to perform their job.
Confidential data must be backed up and recoverable within a 24-hour period.
Confidential data must be backed up and recoverable within a 24-hour period.
Updates to systems containing sensitive data must be approved before being moved to production.
Updates to systems containing sensitive data must be approved before being moved to production.
A record of employees with access to insider information must be maintained, and those employees may not trade company stock during blackout periods
A record of employees with access to insider information must be maintained, and those employees may not trade company stock during blackout periods
Suggested answer: A
asked 18/09/2024
Mark Lalangan
46 questions

Question 29

Report Export Collapse

Which of the following techniques would best detect an inventory fraud scheme?

Analyze Invoice payments just under individual authorization limits.
Analyze Invoice payments just under individual authorization limits.
Analyze stratification of inventory adjustments by warehouse location.
Analyze stratification of inventory adjustments by warehouse location.
Analyze inventory invoice amounts and compare with approved contract amounts.
Analyze inventory invoice amounts and compare with approved contract amounts.
Analyze differences discovered during duplicate payment testing
Analyze differences discovered during duplicate payment testing
Suggested answer: C
asked 18/09/2024
Peter Takacs
32 questions

Question 30

Report Export Collapse

Which of the following is most influenced by a retained earnings policy?

Cash.
Cash.
Dividends.
Dividends.
Gross margin.
Gross margin.
Net income.
Net income.
Suggested answer: D
asked 18/09/2024
Sujit Singh
36 questions
Total 340 questions
Go to page: of 34

Related questions