ExamGecko
Home / IIA / IIA-CIA-Part3 / List of questions
Ask Question

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 31

Add to Whishlist

List of questions

Question 301

Report Export Collapse

Which of the following would be the strongest control to prevent unauthorized wireless network access?

Become a Premium Member for full access
  Unlock Premium Member

Question 302

Report Export Collapse

A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?

Become a Premium Member for full access
  Unlock Premium Member

Question 303

Report Export Collapse

Which of the following is an example of two-factor authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 304

Report Export Collapse

The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?

Become a Premium Member for full access
  Unlock Premium Member

Question 305

Report Export Collapse

Which of the following is considered a physical security control?

Become a Premium Member for full access
  Unlock Premium Member

Question 306

Report Export Collapse

Which of the following business practices promotes a culture of high performance?

Become a Premium Member for full access
  Unlock Premium Member

Question 307

Report Export Collapse

An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?

Become a Premium Member for full access
  Unlock Premium Member

Question 308

Report Export Collapse

A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?

Become a Premium Member for full access
  Unlock Premium Member

Question 309

Report Export Collapse

Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 310

Report Export Collapse

An internal auditor discusses user-defined default passwords with the database administrator. Such passwords will be reset as soon as the user logs in for the first time, but the initial value of the password is set as "123456." Which of the following are the auditor and the database administrator most likely discussing in this situation?

Become a Premium Member for full access
  Unlock Premium Member
Total 340 questions
Go to page: of 34
Search

Related questions