ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?

A.
Incremental processing costs, incremental revenue, and variable manufacturing expenses.
A.
Incremental processing costs, incremental revenue, and variable manufacturing expenses.
Answers
B.
Joint costs, incremental processing costs, and variable manufacturing expenses.
B.
Joint costs, incremental processing costs, and variable manufacturing expenses.
Answers
C.
Incremental revenue, joint costs, and incremental processing costs.
C.
Incremental revenue, joint costs, and incremental processing costs.
Answers
D.
Variable manufacturing expenses, incremental revenue, and joint costs
D.
Variable manufacturing expenses, incremental revenue, and joint costs
Answers
Suggested answer: A

Which of the following best explains the matching principle?

A.
Revenues should be recognized when earned.
A.
Revenues should be recognized when earned.
Answers
B.
Revenue recognition is matched with cash.
B.
Revenue recognition is matched with cash.
Answers
C.
Expense recognition is tied to revenue recognition.
C.
Expense recognition is tied to revenue recognition.
Answers
D.
Expenses are recognized at each accounting period.
D.
Expenses are recognized at each accounting period.
Answers
Suggested answer: C

An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?

A.
Shoulder suiting
A.
Shoulder suiting
Answers
B.
Pharming,
B.
Pharming,
Answers
C.
Phishing.
C.
Phishing.
Answers
D.
Social engineering.
D.
Social engineering.
Answers
Suggested answer: C

An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?

A.
Lower costs.
A.
Lower costs.
Answers
B.
Slower decision making at the senior executive level.
B.
Slower decision making at the senior executive level.
Answers
C.
Limited creative freedom in lower-level managers.
C.
Limited creative freedom in lower-level managers.
Answers
D.
Senior-level executives more focused on short-term, routine decision making
D.
Senior-level executives more focused on short-term, routine decision making
Answers
Suggested answer: D

An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?

A.
Designing and maintaining the database.
A.
Designing and maintaining the database.
Answers
B.
Preparing input data and maintaining the database.
B.
Preparing input data and maintaining the database.
Answers
C.
Maintaining the database and providing its security,
C.
Maintaining the database and providing its security,
Answers
D.
Designing the database and providing its security
D.
Designing the database and providing its security
Answers
Suggested answer: B

Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?

A.
Draft separate audit reports for business and IT management.
A.
Draft separate audit reports for business and IT management.
Answers
B.
Conned IT audit findings to business issues.
B.
Conned IT audit findings to business issues.
Answers
C.
Include technical details to support IT issues.
C.
Include technical details to support IT issues.
Answers
D.
Include an opinion on financial reporting accuracy and completeness.
D.
Include an opinion on financial reporting accuracy and completeness.
Answers
Suggested answer: B

After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.

Which of the following is the most likely control weakness demonstrated by the seller?

A.
Excessive collecting of information
A.
Excessive collecting of information
Answers
B.
Application of social engineering
B.
Application of social engineering
Answers
C.
Retention of incomplete information.
C.
Retention of incomplete information.
Answers
D.
Undue disclosure of information
D.
Undue disclosure of information
Answers
Suggested answer: D

Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

A.
First-in. first-out method (FIFO).
A.
First-in. first-out method (FIFO).
Answers
B.
Last-in, first-out method (LIFO).
B.
Last-in, first-out method (LIFO).
Answers
C.
Specific identification method.
C.
Specific identification method.
Answers
D.
Average-cost method
D.
Average-cost method
Answers
Suggested answer: A

Which of the following is an established systems development methodology?

A.
Waterfall.
A.
Waterfall.
Answers
B.
Projects in Controlled Environments (PRINCE2).
B.
Projects in Controlled Environments (PRINCE2).
Answers
C.
Information Technology Infrastructure Library (ITIL).
C.
Information Technology Infrastructure Library (ITIL).
Answers
D.
COBIT
D.
COBIT
Answers
Suggested answer: A

An organization's technician was granted a role that enables him to prioritize projects throughout the organization. Which type of authority will the technician most likely be exercising?

A.
Legitimate authority
A.
Legitimate authority
Answers
B.
Coercive authority.
B.
Coercive authority.
Answers
C.
Referent authority.
C.
Referent authority.
Answers
D.
Expert authority.
D.
Expert authority.
Answers
Suggested answer: D
Total 340 questions
Go to page: of 34