ExamGecko
Home Home / IIA / IIA-CIA-Part3

IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?

A.
Requiring users to change their passwords every two years.
A.
Requiring users to change their passwords every two years.
Answers
B.
Requiring two-step verification for all users
B.
Requiring two-step verification for all users
Answers
C.
Requiring the use of a virtual private network (VPN) when employees are out of the office.
C.
Requiring the use of a virtual private network (VPN) when employees are out of the office.
Answers
D.
Requiring the use of up-to-date antivirus, security, and event management tools.
D.
Requiring the use of up-to-date antivirus, security, and event management tools.
Answers
Suggested answer: B

According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?

A.
HTTP sites provide sufficient security to protect customers' credit card information.
A.
HTTP sites provide sufficient security to protect customers' credit card information.
Answers
B.
Web servers store credit cardholders' information submitted for payment.
B.
Web servers store credit cardholders' information submitted for payment.
Answers
C.
Database servers send cardholders' information for authorization in clear text.
C.
Database servers send cardholders' information for authorization in clear text.
Answers
D.
Payment gatewaysauthorizecredit cardonlinepayments.
D.
Payment gatewaysauthorizecredit cardonlinepayments.
Answers
Suggested answer: D

Which of the following is a benefit from the concept of Internet of Things?

A.
Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer's knowledge.
A.
Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer's knowledge.
Answers
B.
Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.
B.
Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.
Answers
C.
Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.
C.
Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.
Answers
D.
Data mining and data collection from internet and social networks is easier, and the results are more comprehensive
D.
Data mining and data collection from internet and social networks is easier, and the results are more comprehensive
Answers
Suggested answer: B

Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?

A.
Scope change requests are reviewed and approved by a manager with a proper level of authority.
A.
Scope change requests are reviewed and approved by a manager with a proper level of authority.
Answers
B.
Cost overruns are reviewed and approved by a control committee led by the project manager.
B.
Cost overruns are reviewed and approved by a control committee led by the project manager.
Answers
C.
There is a formal quality assurance process to review scope change requests before they are implemented
C.
There is a formal quality assurance process to review scope change requests before they are implemented
Answers
D.
There is a formal process to monitor the status of the project and compare it to the cost baseline
D.
There is a formal process to monitor the status of the project and compare it to the cost baseline
Answers
Suggested answer: D

What relationship exists between decentralization and the degree, importance, and range of lowerlevel decision making?

A.
Mutually exclusive relationship.
A.
Mutually exclusive relationship.
Answers
B.
Direct relationship.
B.
Direct relationship.
Answers
C.
Intrinsic relationship.
C.
Intrinsic relationship.
Answers
D.
Inverse relationship.
D.
Inverse relationship.
Answers
Suggested answer: B

When would a contract be dosed out?

A.
When there's a dispute between the contracting parties
A.
When there's a dispute between the contracting parties
Answers
B.
When ail contractual obligations have been discharged.
B.
When ail contractual obligations have been discharged.
Answers
C.
When there is a force majenre.
C.
When there is a force majenre.
Answers
D.
When the termination clause is enacted.
D.
When the termination clause is enacted.
Answers
Suggested answer: B

Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?

A.
Last-in-first-Out (LIFO}.
A.
Last-in-first-Out (LIFO}.
Answers
B.
Average cost.
B.
Average cost.
Answers
C.
First-in-first-out (FIFO).
C.
First-in-first-out (FIFO).
Answers
D.
Specific identification
D.
Specific identification
Answers
Suggested answer: C

Which of the following attributes of data are cybersecurity controls primarily designed to protect?

A.
Veracity, velocity, and variety.
A.
Veracity, velocity, and variety.
Answers
B.
Integrity, availability, and confidentiality.
B.
Integrity, availability, and confidentiality.
Answers
C.
Accessibility, accuracy, and effectiveness.
C.
Accessibility, accuracy, and effectiveness.
Answers
D.
Authorization, logical access, and physical access.
D.
Authorization, logical access, and physical access.
Answers
Suggested answer: C

An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;

- Risks specific to the organization itself.

- Risks specific to the service provider.

- Risks shared by both the organization and the service provider

Which of the following risks should the auditor classify as specific to the service provider?

A.
Unexpected increases in outsourcing costs.
A.
Unexpected increases in outsourcing costs.
Answers
B.
Loss of data privacy.
B.
Loss of data privacy.
Answers
C.
Inadequate staffing.
C.
Inadequate staffing.
Answers
D.
Violation of contractual terms.
D.
Violation of contractual terms.
Answers
Suggested answer: D

Which of the following is true regarding the use of remote wipe for smart devices?

A.
It can restore default settings and lock encrypted data when necessary.
A.
It can restore default settings and lock encrypted data when necessary.
Answers
B.
It enables the erasure and reformatting of secure digital (SD) cards.
B.
It enables the erasure and reformatting of secure digital (SD) cards.
Answers
C.
It can delete data backed up to a desktop for complete protection if required.
C.
It can delete data backed up to a desktop for complete protection if required.
Answers
D.
It can wipe data that is backed up via cloud computing
D.
It can wipe data that is backed up via cloud computing
Answers
Suggested answer: B
Total 340 questions
Go to page: of 34