ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











A newly appointed board member received an email that appeared to be from the company's CEO.

The email stated:

"Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners." The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?

A.
A risk of spyware and malware.
A.
A risk of spyware and malware.
Answers
B.
A risk of corporate espionage.
B.
A risk of corporate espionage.
Answers
C.
A ransomware attack risk.
C.
A ransomware attack risk.
Answers
D.
A social engineering risk.
D.
A social engineering risk.
Answers
Suggested answer: A

Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the following would be a characteristic of the now highly centralized organization?

A.
Top management does little monitoring of the decisions made at lower levels.
A.
Top management does little monitoring of the decisions made at lower levels.
Answers
B.
The decisions made at the lower levels of management are considered very important.
B.
The decisions made at the lower levels of management are considered very important.
Answers
C.
Decisions made at lower levels in the organizational structure are few.
C.
Decisions made at lower levels in the organizational structure are few.
Answers
D.
Reliance is placed on top management decision making by few of the organization's departments.
D.
Reliance is placed on top management decision making by few of the organization's departments.
Answers
Suggested answer: D

Which of the following types of accounts must be closed at the end of the period?

A.
Income statement accounts.
A.
Income statement accounts.
Answers
B.
Balance sheet accounts.
B.
Balance sheet accounts.
Answers
C.
Permanent accounts.
C.
Permanent accounts.
Answers
D.
Real accounts.
D.
Real accounts.
Answers
Suggested answer: A

Which of the following would most likely serve as a foundation for individual operational goats?

A.
Individual skills and capabilities.
A.
Individual skills and capabilities.
Answers
B.
Alignment with organizational strategy.
B.
Alignment with organizational strategy.
Answers
C.
Financial and human resources of the unit.
C.
Financial and human resources of the unit.
Answers
D.
Targets of key performance indicators
D.
Targets of key performance indicators
Answers
Suggested answer: D

According to 11A guidance on IT, which of the following are indicators of poor change management?

A.
Inadequate control design.
A.
Inadequate control design.
Answers
B.
Unplanned downtime.
B.
Unplanned downtime.
Answers
C.
Excessive troubleshooting .
C.
Excessive troubleshooting .
Answers
D.
Unavailability of critical services.
D.
Unavailability of critical services.
Answers
E.
2 and 3 only.
E.
2 and 3 only.
Answers
F.
1, 2, and 3 only
F.
1, 2, and 3 only
Answers
G.
1, 3, and 4 only
G.
1, 3, and 4 only
Answers
H.
2, 3, and 4 only
H.
2, 3, and 4 only
Answers
Suggested answer: D

An analytical model determined that on Friday and Saturday nights the luxury brands stores should be open for extended hours and with a doubled number of employees present; while on Mondays and Tuesdays costs can be minimized by reducing the number of employees to a minimum and opening only for evening hours Which of the following best categorizes the analytical model applied?

A.
Descriptive.
A.
Descriptive.
Answers
B.
Diagnostic.
B.
Diagnostic.
Answers
C.
Prescriptive.
C.
Prescriptive.
Answers
D.
Prolific.
D.
Prolific.
Answers
Suggested answer: C

Which of the following biometric access controls uses the most unique human recognition characteristic?

A.
Facial comparison using photo identification.
A.
Facial comparison using photo identification.
Answers
B.
Signature comparison.
B.
Signature comparison.
Answers
C.
Voice comparison.
C.
Voice comparison.
Answers
D.
Retinal print comparison.
D.
Retinal print comparison.
Answers
Suggested answer: D

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?

A.
Cold recovery plan,
A.
Cold recovery plan,
Answers
B.
Outsourced recovery plan.
B.
Outsourced recovery plan.
Answers
C.
Storage area network recovery plan.
C.
Storage area network recovery plan.
Answers
D.
Hot recovery plan
D.
Hot recovery plan
Answers
Suggested answer: C

Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?

A.
Assigning new roles and responsibilities for senior IT management.
A.
Assigning new roles and responsibilities for senior IT management.
Answers
B.
Growing use of bring your own devices for organizational matters.
B.
Growing use of bring your own devices for organizational matters.
Answers
C.
Expansion of operations into new markets with limited IT access.
C.
Expansion of operations into new markets with limited IT access.
Answers
D.
Hiring new personnel within the IT department for security purposes.
D.
Hiring new personnel within the IT department for security purposes.
Answers
Suggested answer: D

Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze, improve, and control. Which of the following best describes this approach?

A.
Six Sigma,
A.
Six Sigma,
Answers
B.
Quality circle.
B.
Quality circle.
Answers
C.
Value chain analysis.
C.
Value chain analysis.
Answers
D.
Theory of constraints.
D.
Theory of constraints.
Answers
Suggested answer: A
Total 340 questions
Go to page: of 34