ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions











When determining the level of physical controls required for a workstation, which of the following factors should be considered?

A.
Ease of use.
A.
Ease of use.
Answers
B.
Value to the business.
B.
Value to the business.
Answers
C.
Intrusion prevention.
C.
Intrusion prevention.
Answers
D.
Ergonomic model.
D.
Ergonomic model.
Answers
Suggested answer: B

During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?

A.
Intrinsic reward.
A.
Intrinsic reward.
Answers
B.
Job enrichment
B.
Job enrichment
Answers
C.
Extrinsic reward.
C.
Extrinsic reward.
Answers
D.
The hierarchy of needs.
D.
The hierarchy of needs.
Answers
Suggested answer: C

During an audit of the payroll system, the internal auditor identifies and documents the following condition:

"Once a user is logged into the system, the user has access to all functionality within the system." What is the most likely root cause for tins issue?

A.
The authentication process relies on a simple password only, which is a weak method of authorization.
A.
The authentication process relies on a simple password only, which is a weak method of authorization.
Answers
B.
The system authorization of the user does not correctly reflect the access rights intended.
B.
The system authorization of the user does not correctly reflect the access rights intended.
Answers
C.
There was no periodic review to validate access rights.
C.
There was no periodic review to validate access rights.
Answers
D.
The application owner apparently did not approve the access request during the provisioning process.
D.
The application owner apparently did not approve the access request during the provisioning process.
Answers
Suggested answer: B

Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?

A.
Variety.
A.
Variety.
Answers
B.
Velocity.
B.
Velocity.
Answers
C.
Volume.
C.
Volume.
Answers
D.
Veracity.
D.
Veracity.
Answers
Suggested answer: D

Which of the following lists best describes the classification of manufacturing costs?

A.
Direct materials, indirect materials, raw materials.
A.
Direct materials, indirect materials, raw materials.
Answers
B.
Overhead costs, direct labor, direct materials.
B.
Overhead costs, direct labor, direct materials.
Answers
C.
Direct materials, direct labor, depreciation on factory buildings.
C.
Direct materials, direct labor, depreciation on factory buildings.
Answers
D.
Raw materials, factory employees' wages, production selling expenses.
D.
Raw materials, factory employees' wages, production selling expenses.
Answers
Suggested answer: B

Which of the following is an effective preventive control for data center security?

A.
Motion detectors.
A.
Motion detectors.
Answers
B.
Key card access to the facility.
B.
Key card access to the facility.
Answers
C.
Security cameras.
C.
Security cameras.
Answers
D.
Monitoring access to data center workstations
D.
Monitoring access to data center workstations
Answers
Suggested answer: B

According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?

A.
Install and update anti-virus software.
A.
Install and update anti-virus software.
Answers
B.
Implement data encryption techniques.
B.
Implement data encryption techniques.
Answers
C.
Set data availability by user need.
C.
Set data availability by user need.
Answers
D.
Upgrade firewall configuration
D.
Upgrade firewall configuration
Answers
Suggested answer: C

Which of the following data security policies is most likely to be the result of a data privacy law?

A.
Access to personally identifiable information is limited to those who need It to perform their job.
A.
Access to personally identifiable information is limited to those who need It to perform their job.
Answers
B.
Confidential data must be backed up and recoverable within a 24-hour period.
B.
Confidential data must be backed up and recoverable within a 24-hour period.
Answers
C.
Updates to systems containing sensitive data must be approved before being moved to production.
C.
Updates to systems containing sensitive data must be approved before being moved to production.
Answers
D.
A record of employees with access to insider information must be maintained, and those employees may not trade company stock during blackout periods
D.
A record of employees with access to insider information must be maintained, and those employees may not trade company stock during blackout periods
Answers
Suggested answer: A

Which of the following techniques would best detect an inventory fraud scheme?

A.
Analyze Invoice payments just under individual authorization limits.
A.
Analyze Invoice payments just under individual authorization limits.
Answers
B.
Analyze stratification of inventory adjustments by warehouse location.
B.
Analyze stratification of inventory adjustments by warehouse location.
Answers
C.
Analyze inventory invoice amounts and compare with approved contract amounts.
C.
Analyze inventory invoice amounts and compare with approved contract amounts.
Answers
D.
Analyze differences discovered during duplicate payment testing
D.
Analyze differences discovered during duplicate payment testing
Answers
Suggested answer: C

Which of the following is most influenced by a retained earnings policy?

A.
Cash.
A.
Cash.
Answers
B.
Dividends.
B.
Dividends.
Answers
C.
Gross margin.
C.
Gross margin.
Answers
D.
Net income.
D.
Net income.
Answers
Suggested answer: D
Total 340 questions
Go to page: of 34