ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











An organization contracted a third-party service provider to plan, design, and build a new facility.

Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?

A.
Cost-plus contract.
A.
Cost-plus contract.
Answers
B.
Turnkey contract.
B.
Turnkey contract.
Answers
C.
Service contract.
C.
Service contract.
Answers
D.
Solutions contract.
D.
Solutions contract.
Answers
Suggested answer: A

Which of the following statements distinguishes a router from a typical switch?

A.
A router operates at layer two. while a switch operates at layer three of the open systems interconnection model.
A.
A router operates at layer two. while a switch operates at layer three of the open systems interconnection model.
Answers
B.
A router transmits data through frames, while a switch sends data through packets.
B.
A router transmits data through frames, while a switch sends data through packets.
Answers
C.
A router connects networks, while a switch connects devices within a network.
C.
A router connects networks, while a switch connects devices within a network.
Answers
D.
A router uses a media access control address during the transmission of data, whie a switch uses an internet protocol address.
D.
A router uses a media access control address during the transmission of data, whie a switch uses an internet protocol address.
Answers
Suggested answer: C

According to Maslow's hierarchy of needs theory, which of the following would likely have the most impact on retaining staff, if their lower-level needs are already met?

A.
Social benefits.
A.
Social benefits.
Answers
B.
Compensation.
B.
Compensation.
Answers
C.
Job safety.
C.
Job safety.
Answers
D.
Recognition
D.
Recognition
Answers
Suggested answer: D

According to I1A guidance on IT. which of the following activities regarding information security Is most likely to be the responsibility of line management as opposed to executive management, internal auditors, or the board?

A.
Review and monitor security controls.
A.
Review and monitor security controls.
Answers
B.
Dedicate sufficient security resources.
B.
Dedicate sufficient security resources.
Answers
C.
Provide oversight to the security function.
C.
Provide oversight to the security function.
Answers
D.
Assess information control environments.
D.
Assess information control environments.
Answers
Suggested answer: B

Which of the following best describes the use of predictive analytics?

A.
A supplier of electrical parts analyzed an instances where different types of spare parts were out of stock prior to scheduled deliveries of those parts.
A.
A supplier of electrical parts analyzed an instances where different types of spare parts were out of stock prior to scheduled deliveries of those parts.
Answers
B.
A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
B.
A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
Answers
C.
A supplier of electrical parts analyzed all instances of a part being, out of stock poor to its scheduled delivery date and discovered that increases in sales of that part consistently correlated with stormy weather.
C.
A supplier of electrical parts analyzed all instances of a part being, out of stock poor to its scheduled delivery date and discovered that increases in sales of that part consistently correlated with stormy weather.
Answers
D.
A supplier of electrical parts analyzed sales and stock information and modelled different scenarios for making decisions on stock reordering and delivery
D.
A supplier of electrical parts analyzed sales and stock information and modelled different scenarios for making decisions on stock reordering and delivery
Answers
Suggested answer: B

Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?

A.
Cash payback technique.
A.
Cash payback technique.
Answers
B.
Discounted cash flow technique: net present value.
B.
Discounted cash flow technique: net present value.
Answers
C.
Annual rate of return
C.
Annual rate of return
Answers
D.
Discounted cash flow technique: internal rate of return.
D.
Discounted cash flow technique: internal rate of return.
Answers
Suggested answer: B

Which of the following is a characteristic of big data?

A.
Big data is often structured.
A.
Big data is often structured.
Answers
B.
Big data analytic results often need to be visualized.
B.
Big data analytic results often need to be visualized.
Answers
C.
Big data is often generated slowly and is highly variable.
C.
Big data is often generated slowly and is highly variable.
Answers
D.
Big data comes from internal sources kept in data warehouses.
D.
Big data comes from internal sources kept in data warehouses.
Answers
Suggested answer: B

On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?

A.
It should be reported as an administrative expense on the income statement.
A.
It should be reported as an administrative expense on the income statement.
Answers
B.
It should be reported as period cost other than a product cost on the management accounts
B.
It should be reported as period cost other than a product cost on the management accounts
Answers
C.
It should be reported as cost of goods sold on the income statement.
C.
It should be reported as cost of goods sold on the income statement.
Answers
D.
It should be reported on the balance sheet as part of inventory.
D.
It should be reported on the balance sheet as part of inventory.
Answers
Suggested answer: C

An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?

A.
Boundary attack.
A.
Boundary attack.
Answers
B.
Spear phishing attack.
B.
Spear phishing attack.
Answers
C.
Brute force attack.
C.
Brute force attack.
Answers
D.
Spoofing attack.
D.
Spoofing attack.
Answers
Suggested answer: B

An organization has an immediate need for servers, but no time to complete capital acquisitions.

Which of the following cloud services would assist with this situation?

A.
Infrastructure as a Service (laaS).
A.
Infrastructure as a Service (laaS).
Answers
B.
Platform as a Service (PaaS).
B.
Platform as a Service (PaaS).
Answers
C.
Enterprise as a Service (EaaS).
C.
Enterprise as a Service (EaaS).
Answers
D.
Software as a Service (SaaS).
D.
Software as a Service (SaaS).
Answers
Suggested answer: D
Total 340 questions
Go to page: of 34