IIA IIA-CIA-Part3 Practice Test - Questions Answers, Page 9

List of questions
Question 81

Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Question 82

According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
Question 83

Which of the following is a benefit from the concept of Internet of Things?
Question 84

Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?
Question 85

What relationship exists between decentralization and the degree, importance, and range of lowerlevel decision making?
Question 86

When would a contract be dosed out?
Question 87

Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
Question 88

Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Question 89

An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;
- Risks specific to the organization itself.
- Risks specific to the service provider.
- Risks shared by both the organization and the service provider
Which of the following risks should the auditor classify as specific to the service provider?
Question 90

Which of the following is true regarding the use of remote wipe for smart devices?
Question