ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











A restaurant decided to expand its business to include delivery services, rather than relying on thirdparty food delivery services. Which of the following best describes the restaurants strategy?

A.
Diversification
A.
Diversification
Answers
B.
Vertical integration
B.
Vertical integration
Answers
C.
Risk avoidance
C.
Risk avoidance
Answers
D.
Differentiation
D.
Differentiation
Answers
Suggested answer: B

For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?

A.
An incorrect program fix was implemented just prior to the database backup.
A.
An incorrect program fix was implemented just prior to the database backup.
Answers
B.
The organization is preparing to train all employees on the new self-service benefits system.
B.
The organization is preparing to train all employees on the new self-service benefits system.
Answers
C.
There was a data center failure that requires restoring the system at the backup site.
C.
There was a data center failure that requires restoring the system at the backup site.
Answers
D.
There is a need to access prior year-end training reports for all employees in the human resources database
D.
There is a need to access prior year-end training reports for all employees in the human resources database
Answers
Suggested answer: C

According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?

A.
Security.
A.
Security.
Answers
B.
Status.
B.
Status.
Answers
C.
Recognition.
C.
Recognition.
Answers
D.
Relationship with coworkers
D.
Relationship with coworkers
Answers
Suggested answer: C

Which of the following is a characteristic of big data?

A.
Big data is being generated slowly due to volume.
A.
Big data is being generated slowly due to volume.
Answers
B.
Big data must be relevant for the purposes of organizations.
B.
Big data must be relevant for the purposes of organizations.
Answers
C.
Big data comes from a single type of formal.
C.
Big data comes from a single type of formal.
Answers
D.
Big data is always changing
D.
Big data is always changing
Answers
Suggested answer: C

Which of the following activities best illustrates a user's authentication control?

A.
Identity requests are approved in two steps.
A.
Identity requests are approved in two steps.
Answers
B.
Logs are checked for misaligned identities and access rights.
B.
Logs are checked for misaligned identities and access rights.
Answers
C.
Users have to validate their identity with a smart card.
C.
Users have to validate their identity with a smart card.
Answers
D.
Functions can toe performed based on access rights
D.
Functions can toe performed based on access rights
Answers
Suggested answer: C

In light of increasing emission taxes in the European Union, a car manufacturer introduced a new middle-class hybrid vehicle specifically for the European market only.

Which of the following competitive strategies has the manufacturer used?

A.
Reactive strategy.
A.
Reactive strategy.
Answers
B.
Cost leadership strategy.
B.
Cost leadership strategy.
Answers
C.
Differentiation strategy.
C.
Differentiation strategy.
Answers
D.
Focus strategy
D.
Focus strategy
Answers
Suggested answer: D

A company produces water buckets with the following costs per bucket:

Direct labor = 82

Direct material = $5

Fixed manufacturing = 83.50

Variable manufacturing = 82.50

The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.

Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?

A.
$9.50
A.
$9.50
Answers
B.
$10.50
B.
$10.50
Answers
C.
$11
C.
$11
Answers
D.
$13
D.
$13
Answers
Suggested answer: A

Which of the following best describes depreciation?

A.
It is a process of allocating cost of assets between periods.
A.
It is a process of allocating cost of assets between periods.
Answers
B.
It is a process of assets valuation.
B.
It is a process of assets valuation.
Answers
C.
It is a process of accumulating adequate funds to replace assets.
C.
It is a process of accumulating adequate funds to replace assets.
Answers
D.
It is a process of measuring decline in the value of assets because of obsolescence
D.
It is a process of measuring decline in the value of assets because of obsolescence
Answers
Suggested answer: A

Which of the following is a sound network configuration practice to enhance information security?

A.
Change management practices to ensure operating system patch documentation is retained.
A.
Change management practices to ensure operating system patch documentation is retained.
Answers
B.
User role requirements are documented in accordance with appropriate application-level control needs.
B.
User role requirements are documented in accordance with appropriate application-level control needs.
Answers
C.
Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
C.
Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
Answers
D.
Interfaces reinforce segregation of duties between operations administration and database development.
D.
Interfaces reinforce segregation of duties between operations administration and database development.
Answers
Suggested answer: C

Which of the following describes a third-party network that connects an organization specifically with its trading partners?

A.
Value-added network (VAN).
A.
Value-added network (VAN).
Answers
B.
Local area network (LAN).
B.
Local area network (LAN).
Answers
C.
Metropolitan area network (MAN).
C.
Metropolitan area network (MAN).
Answers
D.
Wide area network (WAN).
D.
Wide area network (WAN).
Answers
Suggested answer: A
Total 340 questions
Go to page: of 34