CIA Exam Part Three: Business Knowledge for Internal Auditing Questions and Answers
All of the following are true with regard to the first-in, first-out inventory valuation method except:
Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?
Which of the following price adjustment strategies encourages prompt payment?
A brand manager in a consumer food products organization suspected that several days of the point-of-sale data on the spreadsheet from one grocery chain were missing. The best approach for detecting missing rows in spreadsheet data would be to:
Which of the following statements about matrix organizations is false?
An organization engages in questionable financial reporting practices due to pressure to meet unrealistic performance targets. Which internal control component is most negatively affected?
All of the following are possible explanations for a significant unfavorable material efficiency variance except:
The activity that involves a trial run of a product in a typical segment of the market before proceeding to a national launch is referred to as:
According to the Standards, which of the following is based on the assertion that the quality of an organization's risk management process should improve with time?
Which of the following statements is in accordance with COBIT?
1) Pervasive controls are general while detailed controls are specific.
2) Application controls are a subset of pervasive controls.
3) Implementation of software is a type of pervasive control.
4) Disaster recovery planning is a type of detailed control.
A holding company set up a centralized group technology department, using a local area network with a mainframe computer to process accounting information for all companies within the group. An internal auditor would expect to find all of the following controls within the technology department except:
Organizational activities that complement each other and create a competitive advantage are called a:
The market price is the most appropriate transfer price to be charged by one department to another in the same organization for a service provided when:
Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?
Which of the following statements is true regarding the resolution of interpersonal conflict?
An internationally recognized brand name is an entrance barrier to new competitors because new competitors would:
An organization uses a database management system (DBMS) as a repository for data. The DBMS, in turn, supports a number of end-user developed applications which were created using fourth-generation programming languages. Some of the applications update the database. Which of the following is the most important control related to the integrity of the data in the database?
Which of the following standards would be most useful in evaluating the performance of a customer-service group?
Which of the following are the most appropriate measures for evaluating the change in an organization's liquidity position?
According to IIA guidance, which of the following is a typical risk associated with the tender process and contracting stage of an organization's IT outsourcing life cycle?
Which stage in the industry life cycle is characterized by many different product variations?
Which of the following is not a common feature of cumulative preferred stock?
Capacity overbuilding is most likely to occur when management is focused on which of the following?
Preferred stock is less risky for investors than is common stock because:
Which of the following is an example of a risk avoidance response?
The internal audit activity completed an initial risk analysis of the organization's data storage center and found several areas of concern. Which of the following is the most appropriate next step?
Which of the following local area network physical layouts is subject to the greatest risk of failure if one device fails?
If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the auditor should do which of the following?
For an engineering department with a total quality management program, important elements of quality management include all of the following except:
An internal auditor is trying to assess control risk and the effectiveness of an organization's internal controls. Which of the following audit procedures would not provide assurance to the auditor on this matter?
An organization has recorded the following profit and expenses:
Profit before interest and tax
$200,000
Sales
$2,300,000
Purchases of materials
$700,000
Interest expenses
$30,000
If the value-added tax (VAT) rate is 20 percent and the corporate tax rate is 30 percent, which of the following
is the amount of VAT that the organization has to pay?
A company's financial balance sheet is presented below:
The company has net working capital of:
Which of the following descriptions of the internal control system are indicators that risks are managed effectively?
1) Existing controls promote compliance with applicable laws and regulations.
2) The control environment is designed to address all identified risks to the organization.
3) Key controls for significant risks to the organization remain consistent over time.
4) Monitoring systems are in place to alert management to unexpected events.
Which of the following control techniques would minimize the risk of interception during transmission in an electronic data interchange system?
1) Encryption.
2) Traffic padding.
3) Edit checks.
4) Structured data format.
Which of the following conflict resolution methods should be applied when the intention of the parties is to solve the problem by clarifying differences and attaining everyone's objectives?
An internal auditor has been asked to conduct an investigation involving allegations of independent contractor fraud. Which of the following controls would be least effective in detecting any potential fraudulent activity?
Which of the following statements about market signaling is correct?
1) The organization releases information about a new product generation.
2) The organization limits a challenger's access to the best source of raw materials or labor.
3) The organization announces that it is fighting a new process technology.
4) The organization makes exclusive arrangements with the channels.
The following transactions and events occurred during the year:
- $300,000 of raw materials were purchased, of which $20,000 were returned because of defects
- $600,000 of direct labor costs were incurred.
- S750.000 of manufacturing overhead costs were incurred.
What is the organization's cost of goods sold for the year?
The management of working capital is most crucial for which of the following aspects of business?
The leadership of an organization encourages employees to form voluntary problem-solving groups whereby several employees from the same work area meet regularity during work hours to discuss improvements and creative ways to reduce costs. Which of the following best describes this approach?
Which of the following examples demonstrates that the internal audit activity uses descriptive analytics in its engagements?
Division A produces a product with a variable cost of $5 per unit and an allocated fixed cost of $3 per unit The market price of the product is $15 plus 20% selling cost. Division B currently purchases this product from an external supplier but is going to purchase it from division A for $18 Which of the following methods of transfer pricing is being used?
Which of the following statements is true with regard to information protection?
Which of the following can be classified as debt investments?
Which of the following IT controls includes protection for mainframe computers and workstations?
According to IIA guidance on IT. which of the following plans would pair the identification of critical business processes with recovery time objectives?
Which of me following storage options would give the organization the best chance of recovering data?
An internal auditor reviews a data population and calculates the mean, median, and range.
What is the most likely purpose of performing this analytic technique?
Which of the following describes a third-party network that connects an organization specifically with its trading partners?
Which of the following data analytics tools would be applied by an internal audit activity positioned at the lowest level of maturity?
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
An organization uses the management-by-objectives method, whereby employee performance is based on defined goals Which of the following statements is true regarding this approach?
Which of the following best describes the primary objective of cybersecurity?
A manager decided to build his team's enthusiasm by giving encouraging talks about employee empowerment, hoping to change the perception that management should make all decisions in the department.
The manager is most likely trying to impact which of the following components of his team's attitude?
Which of the following statements is true regarding reversing entries in an accounting cycled
In the years after the mind-service point of a depreciable asset which of the following depreciation methods will result in the highest depreciation expense?
An internal auditor is using data analytics to locus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of me following statements is true regarding this scenario?
When attempting to devise creative solutions to problems, team members initially should do which of the following?
How do data analysis technologies affect internal audit testing?
Which of the following types of analytics focuses less on analysis and more on condensing data into mote meaningful pieces of information?
Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?
Based on lest results an IT auditor concluded that the organization would suffer unacceptable toss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
An internal auditor observed that the organization's disaster recovery solution will make use of a code site in a town several miles away Which of the following is likely to be a characteristic of this disaster recovery solution?
An internal auditor is evaluating an organization's business continuity management program According to the guidance on IT. which of the following tests would best demonstrate the ability to perform Key processes without significant problems?
Which of the following is an example of an application system control?
Organizations mat adopt just-in-time purchasing systems often experience which of the following?
An organization's board of directors is particularly focused on positioning the organization as a leader in the industry and beating the competition.
Which of the following strategies offers the greatest alignment with the board's focus?
Which of the following is a logical access control designed to enhance the security of a computer-based application system?
What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical product lines across all of its markets?
Which of the following situations best applies to an organization that uses a project rather man a process to accomplish its business activities?
When is an organic organizational structure likely to be more successful than a mechanistic organizational structure?
Which of the following factors is most responsible for the increasing risk that unauthorized parties may obtain or tamper with personal data?
An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.
Which of the following would be considered the most significant cyber threat to the organization?