3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following statements about slack time and milestones are true?
1) Slack time represents the amount of time a task may be delayed without delaying the entire project.
2) A milestone is a moment in time that marks the completion of the project's major deliverables.
3) Slack time allows the project manager to move resources from one task to another to ensure that the project is finished on time.
4) A milestone requires resource allocation and needs time to be completed.
Which of the following is the most likely reason an organization may decide to undertake a stock split?
Which of the following are typical audit considerations for a review of authentication?
1) Authentication policies and evaluation of controls transactions.
2) Management of passwords, independent reconciliation, and audit trail.
3) Control self-assessment tools used by management.
4) Independent verification of data integrity and accuracy.
Which of the following would provide the most relevant assurance that the application under development will provide maximum value to the organization?
Which of the following is false with regard to Internet connection firewalls?
For an engineering department with a total quality management program, important elements of quality management include all of the following except:
Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?
Which of the following is true regarding an organization's relationship with external stakeholders?
An internal auditor discovered that several unauthorized modifications were made to the production version of an organization's accounting application. Which of the following best describes this deficiency?
Refer to the exhibit.
If the profit margin of an organization decreases, and all else remains equal, which of the following describes
how the "Funds Needed" line in the graph below will shift?
According to MA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?
A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?
A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25,000 shirts. Actual sales total $300,000.
What is margin of safety sales for the company?
Which of the following would be a risk in the development of end-user computing (EUC) applications, compared to traditional information systems?
Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?
An internal auditor performed a review of IT outsourcing and found that the service provider was failing to meet the terms of the service level agreement. Which of the following approaches is most appropriate to address this concern?
According to IIA guidance, which of the following corporate social responsibility (CSR) activities is appropriate for the internal audit activity to perform?
A supervisor receives a complaint from an employee who is frustrated about having to learn a new software
program. The supervisor responds that the new software will enable the employee to work more efficiently and with greater accuracy. This response is an example of:
A company's financial balance sheet is presented below:
The company has net working capital of:
Which stage of group development is characterized by a decrease in conflict and hostility among group members and an increase in cohesiveness?
According to the ISO 14001 standard, which of the following is not included in the requirements for a quality management system?
Which of the following steps should an internal auditor take during an audit of an organization's business continuity plans?
1) Evaluate the business continuity plans for adequacy and currency.
2) Prepare a business impact analysis regarding the loss of critical business.
3) Identify key personnel who will be required to implement the plans.
4) Identify and prioritize the resources required to support critical business processes.
If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the auditor should do which of the following?
Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?
A software that translates hypertext markup language (HTML) documents and allows a user to view a remote web page is called:
During the last year, an organization had an opening inventory of $300,000, purchases of $980,000, sales of $1,850,000, and a gross margin of 40 percent. What is the closing inventory if the periodic inventory system is used?
Which of the following is the primary benefit of including end users in the system development process?
The internal audit activity completed an initial risk analysis of the organization's data storage center and found several areas of concern. Which of the following is the most appropriate next step?
Which of the following is true regarding the COSO enterprise risk management framework?
Multinational organizations generally spend more time and effort to identify and evaluate:
Providing knowledge, motivating organizational members, controlling and coordinating individual efforts, and expressing feelings and emotions are all functions of:
During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?
A manager who is authorized to make purchases up to a certain dollar amount approves the set-up of a fictitious vendor and subsequently initiates purchase orders.
Which of the following controls would best address this risk?
Which of the following statements is true regarding an organization's servers?
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
Which of me Wowing summarizes information about the cash receipts and cash payments for a specific time period?
An employee frequently uses a personal smart device to send and receive work-related emails. Which of the following controls would be most effective to mitigate security risks related to these transmissions?
Which of the following IT-related activities is most commonly performed by the second line of defense?
An organization has instituted a bring-your-own-device (BYOD) work environment Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
Which of the following is classified as a product cost using the variable costing method?
1) Direct labor costs
2) Insurance on a factory.
3) Manufacturing supplies.
4) Packaging and shipping costs
An internal auditor is assessing the risks related to an organization's mobile device pokey She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems Which of the following types of smart device risks should the internal auditor be most concerned about?
Which of the following best describes the purpose of disaster recovery planning?
Which of the following statements about mentoring is true?
1) Mentoring can be used effectively for increasing employee retention
2) Mentoring can be used effectively in reducing employees frustration.
3) Mentoring can be used effectively for increasing organization communication.
4) Mentoring can be used effectively as a short term activity consisting of instruction and training
Which of the following devices best controls both physical and logical access to information systems?
Which of the following data security policies is most likely to be the result of a data privacy law?
Which of the following is a characteristic of using a hierarchical control structure?
Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?
With regard to project management when of the following statements about prefect crashing is true?
Which of the following examples demonstrates that the internal audit activity uses descriptive analytics in its engagements?
A bicycle manufacturer incurs a combination of fixed and variable costs with the production of each bicycle Which of the following statements true recording these costs?
Which of the following would most likely be found in an organization that uses a decentralized organizational structured?
An organization requires an average of 58 days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
Which of the following describes a third-party network that connects an organization specifically with its trading partners?
When examining an organization's strategic plan, an internal auditor should expect to find which of the following components?
Which of the following is an example of a physical security control that should be in place at an organization's data center?
An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is unable to get the desired return on investment and output per hour of labor. Based on this information the organization is most likely focused on which of the following?
A multinational organization has multiple divisions that sell their products internally to other divisions. When selling internally, which of the following transfer prices would lead to the best decisions for the organization?
With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?