ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











When reviewing application controls using the four-level model, which of the following processes are associated with level 4 of the business process method?

A.
Activity
A.
Activity
Answers
B.
Subprocess
B.
Subprocess
Answers
C.
Major process
C.
Major process
Answers
D.
Mega process
D.
Mega process
Answers
Suggested answer: A

Which of the following security controls focuses most on prevention of unauthorized access to the power plant?

A.
An offboarding procedure is initiated monthly to determine redundant physical access rights.
A.
An offboarding procedure is initiated monthly to determine redundant physical access rights.
Answers
B.
Logs generated by smart locks are automatically scanned to identify anomalies in access patterns.
B.
Logs generated by smart locks are automatically scanned to identify anomalies in access patterns.
Answers
C.
Requests for additional access rights are sent for approval and validation by direct supervisors.
C.
Requests for additional access rights are sent for approval and validation by direct supervisors.
Answers
D.
Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours
D.
Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours
Answers
Suggested answer: C

Which of the following best describes a transformational leader, as opposed to a transactional leader?

A.
The leader searches for deviations from the rules and standards and intervenes when deviations exist.
A.
The leader searches for deviations from the rules and standards and intervenes when deviations exist.
Answers
B.
The leader intervenes only when performance standards are not met.
B.
The leader intervenes only when performance standards are not met.
Answers
C.
The leader intervenes to communicate high expectations.
C.
The leader intervenes to communicate high expectations.
Answers
D.
The leader does not intervene to promote problem-solving
D.
The leader does not intervene to promote problem-solving
Answers
Suggested answer: C

Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?

A.
Theory of constraints.
A.
Theory of constraints.
Answers
B.
Just-in-time method.
B.
Just-in-time method.
Answers
C.
Activity-based costing.
C.
Activity-based costing.
Answers
D.
Break-even analysis
D.
Break-even analysis
Answers
Suggested answer: C

Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?

A.
Only preventive measures.
A.
Only preventive measures.
Answers
B.
Alternative and reactive measures.
B.
Alternative and reactive measures.
Answers
C.
Preventive and alternative measures.
C.
Preventive and alternative measures.
Answers
D.
Preventive and reactive measures.
D.
Preventive and reactive measures.
Answers
Suggested answer: B

An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?

A.
he organization's operating expenses are increasing.
A.
he organization's operating expenses are increasing.
Answers
B.
The organization has adopted just-in-time inventory.
B.
The organization has adopted just-in-time inventory.
Answers
C.
The organization is experiencing inventory theft.
C.
The organization is experiencing inventory theft.
Answers
D.
The organization's inventory is overstated.
D.
The organization's inventory is overstated.
Answers
Suggested answer: B

A company records income from an investment in common stock when it does which of the following?

A.
Purchases bonds.
A.
Purchases bonds.
Answers
B.
Receives interest.
B.
Receives interest.
Answers
C.
Receives dividends
C.
Receives dividends
Answers
D.
Sells bonds.
D.
Sells bonds.
Answers
Suggested answer: B

Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?

A.
A list of trustworthy, good traffic and a list of unauthorized, blocked traffic.
A.
A list of trustworthy, good traffic and a list of unauthorized, blocked traffic.
Answers
B.
Monitoring for vulnerabilities based on industry intelligence.
B.
Monitoring for vulnerabilities based on industry intelligence.
Answers
C.
Comprehensive service level agreements with vendors.
C.
Comprehensive service level agreements with vendors.
Answers
D.
Firewall and other network perimeter protection tools.
D.
Firewall and other network perimeter protection tools.
Answers
Suggested answer: B

Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?

A.
Warm site recovery plan.
A.
Warm site recovery plan.
Answers
B.
Hot site recovery plan.
B.
Hot site recovery plan.
Answers
C.
Cool site recovery plan.
C.
Cool site recovery plan.
Answers
D.
Cold site recovery plan.
D.
Cold site recovery plan.
Answers
Suggested answer: A

Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?

A.
Deploys data visualization tool.
A.
Deploys data visualization tool.
Answers
B.
Adopt standardized data analysis software.
B.
Adopt standardized data analysis software.
Answers
C.
Define analytics objectives and establish outcomes.
C.
Define analytics objectives and establish outcomes.
Answers
D.
Eliminate duplicate records.
D.
Eliminate duplicate records.
Answers
Suggested answer: D
Total 340 questions
Go to page: of 34