Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

IIA-CIA-Part3-3P PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

IIA-CIA-Part3-3P PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CIA Exam Part Three: Business Knowledge for Internal Auditing
  • Last Update: Sep 14, 2025
  • Questions and Answers: 488
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

IIA-CIA-Part3-3P Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

IIA-CIA-Part3-3P Practice Exam Questions with Answers CIA Exam Part Three: Business Knowledge for Internal Auditing Certification

Question # 6

According to the International Professional Practices Framework, which of the following statements is true regarding a corporate social responsibility (CSR) program?

1) Every employee generally has a responsibility for ensuring the success of CSR objectives.

2) The board has overall responsibility for the effectiveness of internal control processes associated with CSR.

3) Public reporting on the CSR governance process is expected.

4) Organizations generally have flexibility regarding what is included in a CSR program.

A.

1, 2, and 3 only

B.

1, 2, and 4 only

C.

1, 3, and 4 only

D.

2, 3, and 4 only

Full Access
Question # 7

The process of scenario planning begins with which of the following steps?

A.

Determining the trends that will influence key factors in the organization's environment.

B.

Selecting the issue or decision that will impact how the organization conducts future business.

C.

Selecting leading indicators to alert the organization of future developments.

D.

Identifying how customers, suppliers, competitors, employees, and other stakeholders will react.

Full Access
Question # 8

Which of the following price adjustment strategies encourages prompt payment?

A.

Cash discounts.

B.

Quantity discounts.

C.

Functional discounts.

D.

Seasonal discounts.

Full Access
Question # 9

An organization has received funding to continue a program that utilizes an in-house Due to new legislative requirements the application will require additional features to capture information not previously collected Which of the following is the most critical for completing this specific project?

A.

A detailed budget that identifies hardware resources for the project

B.

A Gantt chart that identifies the critical path for completing the project

C.

Change management controls to avoid technical conflicts within the application

D.

A project plan with a flexible scope to accommodate legislative requirements

Full Access
Question # 10

A bond that matures after one year has a face value of $250,000 and a coupon of $30,000. If the market price of the bond is $265,000, which of the following would be the market interest rate?

A.

Less than 12 percent.

B.

12 percent.

C.

Between 12.01 percent and 12.50 percent.

D.

More than 12.50 percent.

Full Access
Question # 11

According to IIA guidance, which of the following best describes the activities that occur during the conversion phase of an IT project?

A.

Conversion of user requirements into system specifications

B.

Conversion of user requirements into program codes

C.

Conversion of test data into production data

D.

Conversion of data from the old system into the new system

Full Access
Question # 12

The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (IAA's) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA.

Which of the following staffing approaches is the CAE most likely to select?

A.

Assign a team with a trained audit manager to plan each audit and distribute field work tasks to various staff auditors.

B.

Assign a team of personnel who have different specialties to each audit and empower team members to participate fully in key decisions.

C.

Assign a team to each audit, designate a single person to be responsible for each phase of the audit, and limit decision making outside of their area of responsibility.

D.

Assign a team of personnel who have similar specialties to specific engagements that would benefit from those specialties and limit key decisions to the senior person.

Full Access
Question # 13

Which of the following does not provide operational assurance that a computer system is operating properly?

A.

Performing a system audit.

B.

Making system changes.

C.

Testing policy compliance.

D.

Conducting system monitoring.

Full Access
Question # 14

Which of the following statements is correct regarding risk analysis?

A.

The extent to which management judgments are required in an area could serve as a risk factor in assisting the auditor in making a comparative risk analysis.

B.

The highest risk assessment should always be assigned to the area with the largest potential loss.

C.

The highest risk assessment should always be assigned to the area with the highest probability of

occurrence.

D.

Risk analysis must be reduced to quantitative terms in order to provide meaningful comparisons across an organization.

Full Access
Question # 15

A global business organization is selecting managers to post to various international (expatriate) assignments.

In the screening process, which of the following traits would be required to make a manager a successful expatriate?

1) Superior technical competence.

2) Willingness to attempt to communicate in a foreign language.

3) Ability to empathize with other people.

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 3 only

D.

1, 2, and 3

Full Access
Question # 16

Which of the following would best prevent unauthorized external changes to an organization's data?

A.

Antivirus software, firewall, data encryption.

B.

Firewall, data encryption, backup procedures.

C.

Antivirus software, firewall, backup procedures.

D.

Antivirus software, data encryption, change logs.

Full Access
Question # 17

Which of the following actions is most likely to gain support for process change?

A.

Set clear objectives.

B.

Engage the various communities of practice within the organization.

C.

Demonstrate support from senior management.

D.

Establish key competencies.

Full Access
Question # 18

An internationally recognized brand name is an entrance barrier to new competitors because new competitors would:

A.

Have to initiate a price war in order to enter the industry.

B.

Face increased production costs.

C.

Face increased marketing costs.

D.

Face higher learning costs, which would increase fixed costs.

Full Access
Question # 19

According to the Standards, the internal audit activity must evaluate risk exposures relating to which of the following when examining an organization's risk management process?

1) Organizational governance.

2) Organizational operations.

3) Organizational information systems.

4) Organizational structure.

A.

1 and 3 only

B.

2 and 4 only

C.

1, 2, and 3 only

D.

1, 2, and 4 only

Full Access
Question # 20

One change control function that is required in client/server environments, but is not required in mainframe environments, is to ensure that:

A.

Program versions are synchronized across the network.

B.

Emergency move procedures are documented and followed.

C.

Appropriate users are involved in program change testing.

D.

Movement from the test library to the production library is controlled.

Full Access
Question # 21

Unsecured loans are loans:

A.

That do not have to be repaid for over one year.

B.

That appear to be too risky for most lenders to consider.

C.

Granted on the basis of a company's credit standing.

D.

Backed by mortgaged assets.

Full Access
Question # 22

Which of the following is a key characteristic of a zero-based budget?

A.

A zero-based budget provides estimates of costs that would be incurred under different levels of activity.

B.

A zero-based budget maintains focus on the budgeting process.

C.

A zero-based budget is prepared each year and requires each item of expenditure to be justified.

D.

A zero-based budget uses input from lower-level and middle-level managers to formulate budget plans.

Full Access
Question # 23

Which of the following is a role of the board of directors in the governance process?

A.

Conduct periodic assessments of the organization's governance systems.

B.

Obtain assurance concerning the effectiveness of the organization's governance systems.

C.

Implement an effective system of internal controls to support the organization's governance systems.

D.

Review and approve operational goals and objectives.

Full Access
Question # 24

Which of the following statements pertaining to a market skimming pricing strategy is not true?

A.

The strategy is favored when unit costs fall with the increase in units produced.

B.

The strategy is favored when buyers are relatively insensitive to price increases.

C.

The strategy is favored when there is insufficient market capacity and competitors cannot increase market capacity.

D.

The strategy is favored when high price is perceived as high quality.

Full Access
Question # 25

When writing a business memorandum, the writer should choose a writing style that achieves all of the following except:

A.

Draws positive attention to the writing style.

B.

Treats all receivers with respect.

C.

Suits the method of presentation and delivery.

D.

Develops ideas without overstatement.

Full Access
Question # 26

An organization engages in questionable financial reporting practices due to pressure to meet unrealistic performance targets. Which internal control component is most negatively affected?

A.

Monitoring.

B.

Control activities.

C.

Risk assessment.

D.

Control environment.

Full Access
Question # 27

During a review of a web-based application used by customers to check the status of their bank accounts, it would be most important for the internal auditor to ensure that:

A.

Access to read application logs is restricted to authorized users.

B.

Account balance information is encrypted in the database.

C.

The web server used to host the application is located in a physically secure area.

D.

Sensitive data, such as account numbers, are submitted using encrypted communications.

Full Access
Question # 28

Which of the following statements is correct regarding corporate compensation systems and related bonuses?

1) A bonus system should be considered part of the control environment of an organization and should be considered in formulating a report on internal control.

2) Compensation systems are not part of an organization's control system and should not be reported as such.

3) An audit of an organization's compensation system should be performed independently of an audit of the control system over other functions that impact corporate bonuses.

A.

1 only

B.

2 only

C.

3 only

D.

2 and 3 only

Full Access
Question # 29

Which of the following best demonstrates an organization's ability to recover from a disaster?

A.

Hot site

B.

Cold site

C.

Redundant data center

D.

Regular testing of the disaster plan

Full Access
Question # 30

According to the waterfall cycle approach to systems development, which of the following sequence of events is correct?

A.

Program design, system requirements, software design, analysis, coding, testing, operations.

B.

System requirements, software design, analysis, program design, testing, coding, operations.

C.

System requirements, software design, analysis, program design, coding, testing, operations.

D.

System requirements, analysis, coding, software design, program design, testing, operations.

Full Access
Question # 31

Which of the following would provide the most relevant assurance that the application under development will provide maximum value to the organization?

A.

Use of a formal systems development lifecycle.

B.

End-user involvement.

C.

Adequate software documentation.

D.

Formalized non-regression testing phase.

Full Access
Question # 32

Which of the following is true regarding an organization's relationship with external stakeholders?

A.

Specific guidance must be followed when interacting with nongovernmental organizations.

B.

Disclosure laws tend to be consistent from one jurisdiction to another.

C.

There are several internationally recognized standards for dealing with financial donors.

D.

Legal representation should be consulted before releasing internal audit information to other assurance

Full Access
Question # 33

Which of the following is an element of effective negotiating?

A.

Ensuring that the other party has a personal stake in the agreement.

B.

Focusing on interests rather than on obtaining a winning position.

C.

Considering a few select choices during the settlement phase.

D.

Basing the agreement on negotiating power and positioning leverage.

Full Access
Question # 34

Refer to the exhibit.

The figure below shows the network diagram for the activities of a large project. What is the shortest number of days in which the project can be completed?

A.

21 days.

B.

22 days.

C.

27 days.

D.

51 days.

Full Access
Question # 35

Which of the following describes a typical desktop workstation used by most employees in their daily work?

A.

Workstation contains software that prevents unauthorized transmission of information into and out of the organization's network.

B.

Workstation contains software that controls information flow between the organization's network and the Internet.

C.

Workstation contains software that enables the processing of transactions and is not shared among users of the organization's network.

D.

Workstation contains software that manages user's access and processing of stored data on the organization's network.

Full Access
Question # 36

The main reason to establish internal controls in an organization is to:

A.

Encourage compliance with policies and procedures.

B.

Safeguard the resources of the organization.

C.

Ensure the accuracy, reliability, and timeliness of information.

D.

Provide reasonable assurance on the achievement of objectives.

Full Access
Question # 37

A chief audit executive (CAE) was asked to participate in the selection of an external auditor. Which of the following would not be a typical responsibility for the CAE?

A.

Evaluate the proposed external auditor fee.

B.

Recommend criteria to be used in the selection process.

C.

Develop appropriate performance metrics.

D.

Monitor the work of the external auditors.

Full Access
Question # 38

Which of the following are the most appropriate measures for evaluating the change in an organization's liquidity position?

A.

Times interest earned, return on assets, and inventory turnover.

B.

Accounts receivable turnover, inventory turnover in days, and the current ratio.

C.

Accounts receivable turnover, return on assets, and the current ratio.

D.

Inventory turnover in days, the current ratio, and return on equity.

Full Access
Question # 39

For a multinational organization, which of the following is a disadvantage of an ethnocentric staffing policy?

1) It significantly raises compensation and staffing costs.

2) It produces resentment among the organization's employees in host countries.

3) It limits career mobility for parent-country nationals.

4) It can lead to cultural myopia.

A.

1 and 4 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, and 4 only

Full Access
Question # 40

According to IIA guidance, which of the following is a typical risk associated with the tender process and contracting stage of an organization's IT outsourcing life cycle?

A.

The process is not sustained and is not optimized as planned.

B.

There is a lack of alignment to organizational strategies.

C.

The operational quality is less than projected.

D.

There is increased potential for loss of assets.

Full Access
Question # 41

According to IIA guidance on IT auditing, which of the following would not be an area examined by the internal audit activity?

A.

Access system security.

B.

Policy development.

C.

Change management.

D.

Operations processes.

Full Access
Question # 42

According to the Standards, which of the following is based on the assertion that the quality of an organization's risk management process should improve with time?

A.

Process element.

B.

Key principles.

C.

Maturity model.

D.

Assurance.

Full Access
Question # 43

Which of the following statements regarding organizational governance is not correct?

A.

An effective internal audit function is one of the four cornerstones of good governance.

B.

Those performing governance activities are accountable to the customer.

C.

Accountability is one of the key elements of organizational governance.

D.

Governance principles and the need for an internal audit function are applicable to governmental and not-for-profit activities.

Full Access
Question # 44

Listening effectiveness is best increased by:

A.

Resisting both internal and external distractions.

B.

Waiting to review key concepts until the speaker has finished talking.

C.

Tuning out messages that do not seem to fit the meeting purpose.

D.

Factoring in biases in order to evaluate the information being given.

Full Access
Question # 45

A company's financial balance sheet is presented below:

The company has net working capital of:

A.

$160

B.

$210

C.

$350

D.

$490

Full Access
Question # 46

The first step in determining product price is:

A.

Determining the cost of the product.

B.

Developing pricing objectives.

C.

Evaluating prices set by the competitors.

D.

Selecting a pricing method.

Full Access
Question # 47

Which of the following techniques is the most relevant when an internal auditor conducts a valuation of an organization's physical assets?

A.

Observation.

B.

Inspection.

C.

Original cost.

D.

Vouching.

Full Access
Question # 48

Which audit approach should be employed to test the accuracy of information housed in a database on an un-networked computer?

A.

Submit batches of test transactions through the current system and verify with expected results.

B.

Use a test program to simulate the normal data entering process.

C.

Select a sample of records from the database and ensure it matches supporting documentation.

D.

Evaluate compliance with the organization's change management process.

Full Access
Question # 49

Organizations use matrix management to accomplish which of the following?

A.

To improve the chain of command.

B.

To strengthen corporate headquarters.

C.

To focus better on a single market.

D.

To increase lateral communication.

Full Access
Question # 50

Which of the following is a characteristic of an emerging industry?

A.

Established strategy of players.

B.

Low number of new firms.

C.

High unit costs.

D.

Technical expertise.

Full Access
Question # 51

The audit committee of a global corporation has mandated a change in the organization's business ethics policy. Which of the following approaches describes the best way to accomplish the policy's diffusion worldwide?

A.

Deploy the policy in the corporate headquarters' language, so everyone gets an unfiltered version simultaneously.

B.

Introduce the policy region by region, using any lessons learned to change the subsequent version of the policy for the next area.

C.

Consult with legal and operational management in each affected country to ensure the final version can be implemented globally, following audit committee approval.

D.

Send the board-approved version of the policy to each country's senior leadership and empower them to tailor the policy to the local language and culture.

Full Access
Question # 52

Which of the following statements are true regarding the use of heat maps as risk assessment tools?

1. They focus primarily on known risks, limiting the ability to identify new risks.

2. They rely heavily on objective assessments and related risk tolerances.

3. They are too complex to provide an easily understandable view of key risks.

4. They are helpful but limited in value in a rapidly changing environment.

A.

1 and 2 only

B.

1 and 4 only

C.

2 and 3 only

D.

3 and 4 only

Full Access
Question # 53

Which of the following methods, if used in conjunction with electronic data interchange (EDI), will improve the organization's cash management program, reduce transaction data input time and errors, and allow the organization to negotiate discounts with EDI vendors based on prompt payment?

A.

Electronic funds transfer.

B.

Knowledge-based systems.

C.

Biometrics.

D.

Standardized graphical user interface.

Full Access
Question # 54

An organization is considering mirroring the customer data for one regional center at another center. A disadvantage of such an arrangement would be:

A.

Lack of awareness of the state of processing.

B.

Increased cost and complexity of network traffic.

C.

Interference of the mirrored data with the original source data.

D.

Confusion about where customer data are stored.

Full Access
Question # 55

A capital investment project will have a higher net present value, everything else being equal, if it has:

A.

A higher initial investment level.

B.

A higher discount rate.

C.

Cash inflows that are larger in the later years of the life of the project.

D.

Cash inflows that are larger in the earlier years of the life of the project.

Full Access
Question # 56

Which of the following best describes an objective for an audit of an environmental management system?

A.

To assess whether an annual control review is necessary.

B.

To determine conformance with requirements and agreements.

C.

To evaluate executive management oversight.

D.

To promote environmental awareness.

Full Access
Question # 57

Technological uncertainty, subsidy, and spin-offs are usually characteristics of:

A.

Fragmented industries.

B.

Declining industries.

C.

Mature industries.

D.

Emerging industries.

Full Access
Question # 58

An organization needs to borrow a large amount of cash to fund its expansion plan. Which of the following annual interest rates is least expensive?

A.

7 percent simple interest with a 10 percent compensating balance.

B.

7 percent simple interest paid at the end of each year.

C.

7 percent discount interest.

D.

7 percent compounding interest.

Full Access
Question # 59

Which of the following statements about matrix organizations is false?

A.

In a matrix organization, conflict between functional and product managers may arise.

B.

In a matrix organization, staff under dual command is more likely to suffer stress at work.

C.

Matrix organizations offer the advantage of greater flexibility.

D.

Matrix organizations minimize costs and simplify communication.

Full Access
Question # 60

The first stage in the development of a crisis management program is to:

A.

Formulate contingency plans.

B.

Conduct a risk analysis.

C.

Create a crisis management team.

D.

Practice the response to a crisis.

Full Access
Question # 61

Which of the following budgets must be prepared first?

A.

Cash budget.

B.

Production budget.

C.

Sales budget.

D.

Selling and administrative expenses budget.

Full Access
Question # 62

Within an enterprise, IT governance relates to the:

1) Alignment between the enterprise's IT long term plan and the organization's objectives.

2) Organizational structures of the company that are designed to ensure that IT supports the organization's strategies and objectives.

3) Operational plans established to support the IT strategies and objectives.

4) Role of the company's leadership in ensuring IT supports the organization's strategies and objectives.

A.

1 and 2 only

B.

3 and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Full Access
Question # 63

Which of the following is a characteristic of just-in-time inventory management systems?

A.

Users determine the optimal level of safety stocks.

B.

They are applicable only to large organizations.

C.

They do not really increase overall economic efficiency because they merely shift inventory levels further up the supply chain.

D.

They rely heavily on high quality materials.

Full Access
Question # 64

If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the auditor should do which of the following?

A.

Conform with all other parts of The IIA's Standards and provide appropriate disclosures.

B.

Conform with all other parts of The IIA's Standards; there is no need to provide appropriate disclosures.

C.

Continue the engagement without conforming with the other parts of The IIA's Standards.

D.

Withdraw from the engagement.

Full Access
Question # 65

Which of the following is not a method for implementing a new application system?

A.

Direct cutover.

B.

Parallel.

C.

Pilot.

D.

Test.

Full Access
Question # 66

Which of the following statements best describes the frameworks set forth by the International Standards Organization?

A.

Globally accepted standards for industries and processes.

B.

Bridging the gaps among control requirements, technical issues, and business risks.

C.

Practical guidance and benchmarks for all organizations that use information systems.

D.

Frameworks and guidance on enterprise risk management, internal control, and fraud deterrence.

Full Access
Question # 67

Which of the following is a product-oriented definition of a business rather than a market-oriented definition of a business?

A.

We are a people-and-goods mover.

B.

We supply energy.

C.

We make movies.

D.

We provide climate control in the home.

Full Access
Question # 68

An internal auditor discovered that several unauthorized modifications were made to the production version of an organization's accounting application. Which of the following best describes this deficiency?

A.

Production controls weakness.

B.

Application controls weakness.

C.

Authorization controls weakness.

D.

Change controls weakness.

Full Access
Question # 69

An internal auditor is trying to assess control risk and the effectiveness of an organization's internal controls. Which of the following audit procedures would not provide assurance to the auditor on this matter?

A.

Interviewing the organization's employees.

B.

Observing the organization's operations.

C.

Reading the board's minutes.

D.

Inspecting manuals and documents.

Full Access
Question # 70

At what point during the systems development process should an internal auditor verify that the new application's connectivity to the organization's other systems has been established correctly?

A.

Prior to testing the new application.

B.

During testing of the new application.

C.

During implementation of the new application.

D.

During maintenance of the new application.

Full Access
Question # 71

Which of the following is a major advantage of decentralized organizations, compared to centralized organizations?

A.

Decentralized organizations are more focused on organizational goals.

B.

Decentralized organizations streamline organizational structure.

C.

Decentralized organizations tend to be less expensive to operate.

D.

Decentralized organizations tend to be more responsive to market changes.

Full Access
Question # 72

All of the following are true with regard to the first-in, first-out inventory valuation method except:

A.

It values inventory close to current replacement cost.

B.

It generates the highest profit when prices are rising.

C.

It approximates the physical flow of goods.

D.

It minimizes current-period income taxes.

Full Access
Question # 73

In creating a risk-based plan, which of the following best describes a top-down approach to understanding business processes?

A.

Identifying the processes at the activity level.

B.

Analyzing the organization's strategic plan where the business processes are defined.

C.

Analyzing the organization's objectives and identifying the processes needed to achieve the objectives.

D.

Identifying the risks affecting the organization, the objectives, and then the processes concerned.

Full Access
Question # 74

Where complex problems need to be addressed, which of the following communication networks would be most appropriate?

A.

Chain.

B.

All-channel.

C.

Circle.

D.

Wheel.

Full Access
Question # 75

In an organization where enterprise risk management practices are mature, which of the following is a core internal audit role?

A.

Giving assurance that risks are evaluated correctly.

B.

Developing the risk management strategy for the board's approval.

C.

Facilitating the identification and evaluation of risks.

D.

Coaching management in responding to risk.

Full Access
Question # 76

An organization is projecting sales of 100,000 units, at a unit price of $12. Unit variable costs are $7. If fixed costs are $350,000, what is the projected total contribution margin?

A.

$350,000

B.

$500,000

C.

$850,000

D.

$1,200,000

Full Access
Question # 77

According to Porter, which of the following is associated with fragmented industries?

A.

Weak entrance barriers.

B.

Significant scale economies.

C.

Steep experience curve.

D.

Strong negotiation power with suppliers.

Full Access
Question # 78

Which mindset promotes the most comprehensive risk management strategy?

A.

Increase shareholder value.

B.

Maximize market share.

C.

Improve operational efficiency.

D.

Mitigate losses.

Full Access
Question # 79

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity.

Full Access
Question # 80

According to HA guidance or IT which of the following spreadsheets is most likely to be considered a high-risk user-develop application?

A.

A revenue calculation spreadsheet supported with price and volume reports from the production department

B.

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions

C.

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantitates

D.

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances.

Full Access
Question # 81

Which of the following is an example of an application system control?

A.

Data values fall within a prescribed range.

B.

Error listings are generated and promptly remediated.

C.

Report distribution is restricted to authorized personnel.

D.

Field amounts contain an upper or lower limit.

Full Access
Question # 82

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet. When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book.

Which of the following controls would be most effective to prevent such an attack?

A.

Monitoring network traffic.

B.

Using whitelists and blacklists to manage network traffic.

C.

Restricting access and blocking unauthorized access to the network.

D.

Educating employees throughout the company to recognize phishing attacks.

Full Access
Question # 83

Which of the following attributes of data is the most significantly impacted by the internet of things?

A.

Normalization.

B.

Velocity.

C.

Structurization.

D.

Veracity.

Full Access
Question # 84

In which of the following scenarios would transfer pricing be used?

A.

Company A owns Company B; Company B sells goods to Company A.

B.

Company A does not own Company B. Company A charges Company B a fee to sell Company B's goods without taking ownership of the goods.

C.

Company A owns both Company B and Company C; all three companies sell goods to the public.

D.

Company A moves goods internally from one location to another.

Full Access
Question # 85

An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?

A.

Normalize the data

B.

Obtain the data

C.

identify the risks

D.

Analyze the data

Full Access
Question # 86

An internal auditor is using data analytics to locus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of me following statements is true regarding this scenario?

A.

The auditor is normalizing data in preparation for analyzing it

B.

The auditor is analyzing the data in preparation for communicating the results

C.

The auditor is cleaning the data in preparation for determining which processes may tie involved

D.

The auditor is reviewing the data prior to defining the question

Full Access
Question # 87

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

A.

Rooting.

B.

Eavesdropping.

C.

Man in the middle.

D.

Session hijacking.

Full Access
Question # 88

The management of working capital is most crucial for which of the following aspects of business?

A.

Liquidity.

B.

Profitability.

C.

Solvency.

D.

Efficiency.

Full Access
Question # 89

Which of the following statements is true regarding cost-volume-profit analysis?

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.

B.

Breakeven point is the amount of units sold to cover variable costs.

C.

Breakeven occurs when the contribution margin covers fixed costs

D.

Following breakeven, net operating income will increase by the excess of fixed costs less the variable costs per units sold

Full Access
Question # 90

What would be the effect if an organization paid one of its liabilities twice during the year in error?

A.

Assets liabilities and owners' equity would be understated

B.

Assets net income and owners' equity would be unaffected

C.

Assets and liabilities would be understated

D.

Assets net income and owners' equity would be understated, but liabilities would be overstated

Full Access
Question # 91

With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?

A.

Determining the frequency with which backups will be performed.

B.

Prioritizing the order in which business systems would be restored.

C.

Assigning who in the IT department would be involved in the recovery procedures.

D.

Assessing the resources needed to meet the data recovery objectives

Full Access
Question # 92

An internal auditor was asked to review an equal equity partnership In one sampled transaction Partner A transferred equipment into the partnership with a self-declared value of $10,000 and Partner B contributed equipment with a self-declared value of $15 000 The capital accounts of each partner were subsequently credited with S12,500. Which of the following statements is true regarding this transaction?

A.

The capital accounts of the partners should be increased by the original cost of the contributed equipment.

B.

The capital accounts should be increased using a weighted average based on the current percentage of ownership

C.

No action is needed as the capital account of each partner was increased by the correct amount

D.

The capital accounts of the partners should be increased by the fair market value of their contribution

Full Access
Question # 93

Which of the following assumptions regarding cost-volume-profit analysis is true?

A.

Costs are affected by changes in activity only.

B.

The behavior of costs and revenues is inverse.

C.

When more than one type of product is sold, the sales mix changes.

D.

Only variable costs have to be classified accurately.

Full Access
Question # 94

Which of the following statements is true regarding the "management-by-objectives" method?

A.

Management by objectives is most helpful in organizations that nave rapid changes.

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.

Management by objectives helps organizations to keep employees motivated.

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals

Full Access
Question # 95

While conducting audit procedures at the organization's data center, an internal auditor noticed the following:

Backup media was located on data center shelves.

Backup media was organized by date.

Backup schedule was one week in duration.

The system administrator was able to present restore logs.

Which of the following is reasonable for the internal auditor to conclude?

A.

Backup media is not properly stored, as the storage facility should be off-site.

B.

Backup procedures are adequate and appropriate according to best practices.

C.

Backup media is not properly indexed, as backup media should be indexed by system, not date.

D.

Backup schedule is not sufficient, as full backup should be conducted daily.

Full Access
Question # 96

Which of the following methods is most closely associated to year over year trends?

A.

Horizontal analysis

B.

Vertical analysis

C.

Common-size analysis

D.

Ratio analysis

Full Access
Question # 97

Based on lest results an IT auditor concluded that the organization would suffer unacceptable toss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

A.

Requested backup tapes were not returned from the offsite vendor in a timely manner

B.

Returned backup tapes from the offsite vendor contained empty spaces

C.

Critical systems have been Backed up more frequently than required.

D.

Critical system backup tapes are taken off site less frequently than required.

Full Access
Question # 98

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

A.

The risk that users try to bypass controls and do not install required software updates.

B.

The risk that smart devices can be lost or stolen due to their mobile nature.

C.

The risk that an organization intrusively monitors personal information stored on smart devices.

D.

The risk that proprietary information is not deleted from the device when an employee leaves.

Full Access
Question # 99

At a manufacturing plant, how would using Internet of Things during the production process benefit the organization?

A.

It would provide the ability to monitor in real-time.

B.

It would assist in securing sensitive data.

C.

It would help detect cyberattacks in a more timely fashion.

D.

It would assist in ensuring that data integrity is maintained.

Full Access
Question # 100

A multinational organization involved in online business has planned to set up a help desk service. Which of the following best describes the role performed by the help desk?

A.

Monitoring access to the online database.

B.

Backing up and maintaining archived data.

C.

Responding to customer inquiries.

D.

Maintaining and assuring network security.

Full Access
Question # 101

A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager.

Which of the following organizational structures does this situation represent?

A.

Functional departmentalization.

B.

Product departmentalization.

C.

Matrix organization.

D.

Divisional organization.

Full Access
Question # 102

Management has established a performance measurement focused on the accuracy of disbursements The disbursement statistics, provided daily to all accounts payable and audit staff, include details of payments stratified by amount and frequency Which of the following is likely to be the greatest concern regarding this performance measurement?

A.

Articulation of the data.

B.

Availability of the data

C.

Measurability of the data

D.

Relevance of the data

Full Access
Question # 103

Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?

A.

Predictive analytics

B.

Prescriptive analytics

C.

Descriptive analytics

D.

Diagnostic analytics

Full Access
Question # 104

The leadership of an organization encourages employees to form voluntary problem-solving groups whereby several employees from the same work area meet regularity during work hours to discuss improvements and creative ways to reduce costs. Which of the following best describes this approach?

A.

Open-book management

B.

Quality control circles

C.

Self-managed teams

D.

Cross-functional teams

Full Access
Question # 105

An internal auditor is assessing the risks related to an organization's mobile device pokey She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems Which of the following types of smart device risks should the internal auditor be most concerned about?

A.

Compliance

B.

Privacy

C.

Strategic

D.

Physical security.

Full Access
Question # 106

Which of the following application controls can be defined as controls that monitor data Being processed and in storage to ensure it remains consistent and correct?

A.

Input controls

B.

Output controls

C.

Integrity controls

D.

Processing controls

Full Access
Question # 107

An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.

Which of the following would be considered the most significant cyber threat to the organization?

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports.

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing the financial information of the company.

Full Access
Question # 108

In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as part of reviewing workstations?

A.

Input controls.

B.

Segregation of duties.

C.

Physical controls.

D.

Integrity controls.

Full Access
Question # 109

An organization is developing a new online collaboration tool for employees. The tool includes a homepage that is customized to each employee according to his department and job function Which of the following engagements should be conducted to ensure that the organization has included all departments and job functions in the system before it is implemented?

A.

An application control review

B.

A source code review

C.

A design review

D.

An access control review

Full Access
Question # 110

According to IIA guidance on IT which of the following best describes a but recovery and restore processes have not been defined?

A.

Hot recovery plan

B.

Warm recovery plan

C.

Cold recovery plan.

D.

Absence of recovery plan

Full Access
Question # 111

An organization's network administrator received an email that appeared to come from the organization's external IT service provider requesting his credentials to perform an update of a server operating system If the IT service provider did not send the email, which of the following best describes the likely purpose of the email?

A.

An attempt at phishing.

B.

An attempt at penetration testing

C.

An attempt to patch the server

D.

An attempt to launch malware

Full Access
Question # 112

Which of the following data security policies is most likely to be the result of a data privacy law?

A.

Access to personally identifiable information is limited to those who need it to perform their job.

B.

Confidential data must be backed up and recoverable within a 24-hour period.

C.

Updates to systems containing sensitive data must be approved before being moved to production.

D.

A record of employees with access to insider information must be maintained and those employees may not trade company stock during blackout periods

Full Access
Question # 113

Which of the following application controls verifies the accuracy of transaction results in a system?

A.

Input controls

B.

Output controls

C.

Processing controls

D.

Integrity controls

Full Access
Question # 114

An internal audit activity is piloting a data analytics model, which aims to identify anomalies in payments to vendors and potential fraud indicators Which of the following would be the most appropriate criteria for assessing the success of the piloted model?

A.

The percentage of cases flagged by the model and confirmed as positives.

B.

The development and maintenance costs associated with the model

C.

The feedback of auditors involved with developing the model

D.

The number of criminal investigations initiated based on the outcomes of the model

Full Access
Question # 115

Which of the following situations best applies to an organization that uses a project rather man a process to accomplish its business activities?

A.

A clothing company designs makes and sells a new item.

B.

A commercial constructor company is hired to build a warehouse.

C.

A city department sets up a new firefighter training program.

D.

A manufacturing organization acquires component parts from a contracted vendor

Full Access
Question # 116

Which of the following statements is true concerning the basic accounting treatment of a partnership?

A.

The initial investment of each partner should be recorded at book value.

B.

The ownership ratio identifies the basis for dividing net income and net loss.

C.

A partner's capital only changes due to net income or net loss.

D.

The basis for sharing net incomes or net losses must be fixed.

Full Access
Question # 117

An organization's account for office supplies on hand had a balance of S9,000 at the end of year one. During year two. the organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?

A.

A debit to office supplies on hand for S2.500

B.

A debit to office supplies on hand for $11,500

C.

A debit to office supplies on hand for S20.500

D.

A debit to office supplies on hand for S42.500

Full Access
Question # 118

Which of the following risks is best addressed by encryption?

A.

Information integrity risk.

B.

Privacy risk

C.

Access risk

D.

Software risk

Full Access
Question # 119

Which of me following is applicable to both a job order cost system and a process cost system?

A.

Total manufacturing costs are determined at the end of each period.

B.

Costs are summarized in a production cost repot for each department

C.

Three manufacturing cost elements are tracked direct materials direct labor and manufacturing overhead.

D.

The unit cost can be calculated by dividing the total manufacturing costs for the period by the units produced during the period

Full Access
Question # 120

Which of the following controls would be the most effective in preventing the disclosure of an organization’s confidential electronic information?

A.

Non-disclosure agreements between the firm and its employees

B.

Logs of user activity within the information system

C.

Two-factor authentication for access into the information system

D.

Limited access to information based on employee duties

Full Access
Question # 121

Which of the following is a security feature that involves the use of hardware and software to fitter or prevent specific information from moving between the outside network and the outside network?

A.

Authorization

B.

Architecture model

C.

Firewall

D.

Virtual private network

Full Access
Question # 122

According to IIA guidance on IT. which of the following plans would pair the identification of critical business processes with recovery time objectives?

A.

The business continuity management charter.

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Full Access
Question # 123

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations such as copyright or privacy laws?

A.

Not installing anti-malware software

B.

Updating operating software in a haphazard manner

C.

Applying a weak password for access to a mobile device

D.

Jailbreaking a locked smart device.

Full Access
Question # 124

According to IIA guidance, which of the following is the correct order to conduct a business impact analysis (BIA) for the potential loss of an organization's network services''

1. identify resources and partners to provide required recovery services

2. Identify the business processes supporting the network functionality

3. Obtain approval of the BIA from the operating managers relative to their areas of responsibility

4. Identify the business impact if the network services cannot be performed

A.

1, 2, 3, 4

B.

2, 1, 4, 3

C.

2, 4, 1, 3

D.

4, 2, 1, 3

Full Access
Question # 125

In which of the following plans is an employee most likely to find guidance on action and performance standards?

A.

Operational plans.

B.

Tactical plans.

C.

Strategic plans.

D.

Mission plans.

Full Access
Question # 126

Which of the following performance measures disincentivizes engaging in earnings management?

A.

Linking performance to profitability measures such as return on investment.

B.

Linking performance to the stock price.

C.

Linking performance to quotas such as units produced.

D.

Linking performance to nonfinancial measures such as customer satisfaction and employees training.

Full Access
Question # 127

An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?

A.

Duplicate testing.

B.

Joining data sources

C.

Gap analysis

D.

Classification

Full Access
Question # 128

Which of me following statements is true regarding the reporting of tangible and intangible assets?

A.

For plant assets cost includes the purchase price and the cost of design and construction

B.

For intangible assets cost includes the purchase price and development costs

C.

Due to their indefinite nature intangible assets are not subject to amortization

D.

The organization must expense any cost incurred in developing a plant asset

Full Access
Question # 129

When using cost-volume-profit analysts which of the following will increase operating income once the break-even point has been reached?

A.

Fixed costs per unit for each additional unit sold

B.

Variable costs per unit for each additional unit sold

C.

Contribution margin per unit for each additional unit sold

D.

Gross margin per unit for each additional unit sold

Full Access
Question # 130

The board has requested that the internal audit activity be involved in all phases of the organization's outsourcing of its network management. During which of the following stages is the internal auditor most likely to verify that the organization's right-to-audit clause is drafted effectively?

A.

Implementation and transition phase.

B.

Monitoring and reporting phase

C.

Decision-making and business-case phase.

D.

Tendering and contracting phase.

Full Access
Question # 131

According to MA guidance, which of the following would indicate poor change management control?

1) Low change success rate

2) Occasional planned outages

3) Low number of emergency changes.

4) Instances of unauthorized changes

A.

1 and 3

B.

1 and 4

C.

2 and 3

D.

2 and 4

Full Access
Question # 132

Which of the following types of analytics would be used by an organization to examine metrics by business units and identity the most profitable business units?

A.

Detailed analytics

B.

Predictive analytics

C.

Diagnostic analytics

D.

Prescriptive analytics

Full Access
Question # 133

Which of the following is an example of a key systems development control typically found in the in-house development of an application system?

A.

Logical access controls monitor application usage and generate audit trails.

B.

The development process is designed to prevent, detect and correct errors that may occur

C.

A record is maintained to track the process of data from input, to output, to storage

D.

Business users' requirements are documented, and their achievement is monitored

Full Access
Question # 134

A restaurant deeded to expand its business to include delivery services rather than relying on third-party food delivery services. Which of the following best describes the restaurant's strategy?

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Full Access
Question # 135

In an organization's established accounts payable department employees perform highly structured activities follow clearly defined procedures and have strict deadlines for performing their tasks The head of the department recently retired, and a new department head was hired To achieve the greatest benefit for this department and avoid redundancy the new leader should adopt which of the following leadership styles?

A.

Achievement-oriented style

B.

People-oriented style

C.

Goal-oriented style

D.

Task-oriented style

Full Access
Question # 136

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

A.

An extranet

B.

A local area network.

C.

An intranet

D.

The internet

Full Access
Question # 137

An organization is experiencing a high turnover. Which of the following can human resources deploy to effectively detect the root cause of turnover?

A.

Require regular performance appraisals

B.

Perform exit interviews

C.

Encourage periodic rotation of employee duties.

D.

Ensure mandatory vacations

Full Access
Question # 138

If a just-in-time purchasing system is successful in reducing the total inventory costs of a manufacturing company, which of the following combinations of cost changes would be most likely to occur?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 139

An internal auditor observed that the organization's disaster recovery solution will make use of a code site in a town several miles away Which of the following is likely to be a characteristic of this disaster recovery solution?

A.

Data is synchronized in real lime

B.

Recovery time is expected to be less than one week

C.

Servers are not available and need to be procured

D.

Recovery resources and data restore processes have not been defined

Full Access
Question # 140

During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an analytics tool to identify the top five vendors that received the highest sum of payments.

Which of the following analytics techniques did the auditor apply?

A.

Process analysis.

B.

Process mining.

C.

Data analysis.

D.

Data mining.

Full Access
Question # 141

Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?

A.

Cost method

B.

Equity method

C.

Consolidation method

D.

Fair value method

Full Access
Question # 142

Senior management is trying to decide whether to use the direct write-off or allowance method for recording bad debt on accounts receivables.

Which of the following would be the best argument for using the direct write-off method?

A.

It is useful when losses are considered insignificant.

B.

It provides a better alignment with revenue.

C.

It is the preferred method according to The IIA.

D.

It states receivables at net realizable value on the balance sheet.

Full Access
Question # 143

Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?

A.

Whether customers are asked to renew their consent for their data processing at least quarterly.

B.

Whether private data is processed in accordance with the purpose for which the consent was obtained.

C.

Whether the organization has established explicit and entitywide policies on data transfer to third parties.

D.

Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.

Full Access
Question # 144

When using data analytics during a review of the procurement process what is the first step in the analysis process?

A.

Identity data anomalies and outliers

B.

Define questions to be answered

C.

identify data sources available

D.

Determine the scope of the data extract

Full Access
Question # 145

Which of the following statements is true regarding reversing entries in an accounting cycled

A.

Reversing all previous closing adjustments is a mandatory step in the accounting cycle

B.

Reversing entries should be completed at the end of the next accounting period after recording regular transactions of the period

C.

Reversing entries are identical to the adjusting entries made in the previous period.

D.

Reversing entries are the exact opposite of the adjustments made in the previous period.

Full Access
Question # 146

A bicycle manufacturer incurs a combination of fixed and variable costs with the production of each bicycle Which of the following statements true recording these costs?

A.

If the number of bicycles produced is increased by 15 percent, the variable cost per unit will increase proportionally

B.

The fixed cost per unit will vary directly based on the number of bicycles produced during the

production cycle

C.

The total variable cost will vary proportionally and inversely with the number of bicycles produced during a production run

D.

If the number of bicycles produced is increased by 30 percent the fixed cost per unit will decline

Full Access