IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 9
List of questions
Question 81
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Question 82
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
Question 83
Which of the following is a benefit from the concept of Internet of Things?
Question 84
Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?
Question 85
What relationship exists between decentralization and the degree, importance, and range of lowerlevel decision making?
Question 86
When would a contract be dosed out?
Question 87
Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
Question 88
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Question 89
An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;
- Risks specific to the organization itself.
- Risks specific to the service provider.
- Risks shared by both the organization and the service provider
Which of the following risks should the auditor classify as specific to the service provider?
Question 90
Which of the following is true regarding the use of remote wipe for smart devices?
Question