Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

IIA IIA-CIA-Part3-3P Dumps

CIA Exam Part Three: Business Knowledge for Internal Auditing Questions and Answers

Question 1

All of the following are true with regard to the first-in, first-out inventory valuation method except:

Options:

A.

It values inventory close to current replacement cost.

B.

It generates the highest profit when prices are rising.

C.

It approximates the physical flow of goods.

D.

It minimizes current-period income taxes.

Question 2

Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?

Options:

A.

Each party's negotiator presents a menu of options to the other party.

B.

Each party adopts one initial position from which to start.

C.

Each negotiator minimizes the information provided to the other party.

D.

Each negotiator starts with an offer, which is optimal from the negotiator's perspective.

Question 3

Which of the following price adjustment strategies encourages prompt payment?

Options:

A.

Cash discounts.

B.

Quantity discounts.

C.

Functional discounts.

D.

Seasonal discounts.

Question 4

A brand manager in a consumer food products organization suspected that several days of the point-of-sale data on the spreadsheet from one grocery chain were missing. The best approach for detecting missing rows in spreadsheet data would be to:

Options:

A.

Sort on product identification code and identify missing product identification codes.

B.

Review store identification code and identify missing product identification codes.

C.

Compare product identification codes for consecutive periods.

D.

Compare product identification codes by store for consecutive periods.

Question 5

Which of the following statements about matrix organizations is false?

Options:

A.

In a matrix organization, conflict between functional and product managers may arise.

B.

In a matrix organization, staff under dual command is more likely to suffer stress at work.

C.

Matrix organizations offer the advantage of greater flexibility.

D.

Matrix organizations minimize costs and simplify communication.

Question 6

An organization engages in questionable financial reporting practices due to pressure to meet unrealistic performance targets. Which internal control component is most negatively affected?

Options:

A.

Monitoring.

B.

Control activities.

C.

Risk assessment.

D.

Control environment.

Question 7

All of the following are possible explanations for a significant unfavorable material efficiency variance except:

Options:

A.

Cutbacks in preventive maintenance.

B.

An inadequately trained and supervised labor force.

C.

A large number of rush orders.

D.

Production of more units than planned for in the master budget.

Question 8

The activity that involves a trial run of a product in a typical segment of the market before proceeding to a national launch is referred to as:

Options:

A.

Test marketing

B.

Experimentation

C.

Segmentation

D.

Positioning

Question 9

According to the Standards, which of the following is based on the assertion that the quality of an organization's risk management process should improve with time?

Options:

A.

Process element.

B.

Key principles.

C.

Maturity model.

D.

Assurance.

Question 10

Which of the following statements is in accordance with COBIT?

1) Pervasive controls are general while detailed controls are specific.

2) Application controls are a subset of pervasive controls.

3) Implementation of software is a type of pervasive control.

4) Disaster recovery planning is a type of detailed control.

Options:

A.

1 and 4 only

B.

2 and 3 only

C.

2, 3, and 4 only

D.

1, 2, and 4 only

Question 11

A holding company set up a centralized group technology department, using a local area network with a mainframe computer to process accounting information for all companies within the group. An internal auditor would expect to find all of the following controls within the technology department except:

Options:

A.

Adequate segregation of duties between data processing controls and file security controls.

B.

Documented procedures for remote job entry and for local data file retention.

C.

Emergency and disaster recovery procedures and maintenance agreements in place to ensure continuity of operations.

D.

Established procedures to prevent and detect unauthorized changes to data files.

Question 12

Organizational activities that complement each other and create a competitive advantage are called a:

Options:

A.

Merger.

B.

Strategic fit.

C.

Joint venture.

D.

Strategic goal.

Question 13

The market price is the most appropriate transfer price to be charged by one department to another in the same organization for a service provided when:

Options:

A.

There is an external market for that service.

B.

The selling department operates at 50 percent of its capacity.

C.

The purchasing department has more negotiating power than the selling department.

D.

There is no external market for that service.

Question 14

Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?

Options:

A.

Both the key used to encrypt the data and the key used to decrypt the data are made public.

B.

The key used to encrypt the data is kept private but the key used to decrypt the data is made public.

C.

The key used to encrypt the data is made public but the key used to decrypt the data is kept private.

D.

Both the key used to encrypt the data and the key used to decrypt the data are made private.

Question 15

Which of the following statements is true regarding the resolution of interpersonal conflict?

Options:

A.

Unrealized expectations can be avoided with open and honest discussion.

B.

Reorganization would probably not help ambiguous or overlapping jurisdictions.

C.

Deferring action should be used until there is sufficient time to fully deal with the issue.

D.

Timely and unambiguous clarification of roles and responsibilities will eliminate most interpersonal conflict.

Question 16

An internationally recognized brand name is an entrance barrier to new competitors because new competitors would:

Options:

A.

Have to initiate a price war in order to enter the industry.

B.

Face increased production costs.

C.

Face increased marketing costs.

D.

Face higher learning costs, which would increase fixed costs.

Question 17

An organization uses a database management system (DBMS) as a repository for data. The DBMS, in turn, supports a number of end-user developed applications which were created using fourth-generation programming languages. Some of the applications update the database. Which of the following is the most important control related to the integrity of the data in the database?

Options:

A.

End users have their read-only applications approved by the information systems department before accessing the database.

B.

Concurrency update controls are in place.

C.

End-user applications are developed on personal computers before being implemented on the

mainframe.

D.

A hierarchical database model is adopted so that multiple users can be served at the same time.

Question 18

Which of the following standards would be most useful in evaluating the performance of a customer-service group?

Options:

A.

The average time per customer inquiry should be kept to a minimum.

B.

Customer complaints should be processed promptly.

C.

Employees should maintain a positive attitude when dealing with customers.

D.

All customer inquiries should be answered within seven days of receipt.

Question 19

Which of the following are the most appropriate measures for evaluating the change in an organization's liquidity position?

Options:

A.

Times interest earned, return on assets, and inventory turnover.

B.

Accounts receivable turnover, inventory turnover in days, and the current ratio.

C.

Accounts receivable turnover, return on assets, and the current ratio.

D.

Inventory turnover in days, the current ratio, and return on equity.

Question 20

According to IIA guidance, which of the following is a typical risk associated with the tender process and contracting stage of an organization's IT outsourcing life cycle?

Options:

A.

The process is not sustained and is not optimized as planned.

B.

There is a lack of alignment to organizational strategies.

C.

The operational quality is less than projected.

D.

There is increased potential for loss of assets.

Question 21

Which stage in the industry life cycle is characterized by many different product variations?

Options:

A.

Introduction.

B.

Growth.

C.

Maturity.

D.

Decline.

Question 22

Which of the following is not a common feature of cumulative preferred stock?

Options:

A.

Priority over common stock with regard to dilution of shares.

B.

Priority over common stock with regard to earnings.

C.

Priority over common stock with regard to dividend payment.

D.

Priority over common stock with regard to assets.

Question 23

Capacity overbuilding is most likely to occur when management is focused on which of the following?

Options:

A.

Marketing.

B.

Finance.

C.

Production.

D.

Diversification.

Question 24

Preferred stock is less risky for investors than is common stock because:

Options:

A.

Common stock pays dividends as a stated percentage of face value.

B.

Common stock has priority over preferred stock with regard to earnings and assets.

C.

Preferred dividends are usually cumulative.

D.

Preferred stock with no conversion feature has a higher dividend yield than does convertible preferred stock.

Question 25

Which of the following is an example of a risk avoidance response?

Options:

A.

Buying an insurance policy to protect against loss events.

B.

Hedging against natural gas price fluctuations.

C.

Selling a non-strategic business unit.

D.

Outsourcing a high risk process to a third party.

Question 26

The internal audit activity completed an initial risk analysis of the organization's data storage center and found several areas of concern. Which of the following is the most appropriate next step?

Options:

A.

Risk response.

B.

Risk identification.

C.

Identification of context.

D.

Risk assessment.

Question 27

Which of the following local area network physical layouts is subject to the greatest risk of failure if one device fails?

Options:

A.

Star network.

B.

Bus network.

C.

Token ring network.

D.

Mesh network.

Question 28

If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the auditor should do which of the following?

Options:

A.

Conform with all other parts of The IIA's Standards and provide appropriate disclosures.

B.

Conform with all other parts of The IIA's Standards; there is no need to provide appropriate disclosures.

C.

Continue the engagement without conforming with the other parts of The IIA's Standards.

D.

Withdraw from the engagement.

Question 29

For an engineering department with a total quality management program, important elements of quality management include all of the following except:

Options:

A.

Basing performance evaluations on the number of projects completed.

B.

Comparing results with those of other engineering departments.

C.

Creating a quality council within the engineering department.

D.

Conducting post-project surveys on performance.

Question 30

An internal auditor is trying to assess control risk and the effectiveness of an organization's internal controls. Which of the following audit procedures would not provide assurance to the auditor on this matter?

Options:

A.

Interviewing the organization's employees.

B.

Observing the organization's operations.

C.

Reading the board's minutes.

D.

Inspecting manuals and documents.

Question 31

An organization has recorded the following profit and expenses:

Profit before interest and tax

$200,000

Sales

$2,300,000

Purchases of materials

$700,000

Interest expenses

$30,000

If the value-added tax (VAT) rate is 20 percent and the corporate tax rate is 30 percent, which of the following

is the amount of VAT that the organization has to pay?

Options:

A.

$34,000

B.

$51,000

C.

$60,000

D.

$320,000

Question 32

A company's financial balance sheet is presented below:

The company has net working capital of:

Options:

A.

$160

B.

$210

C.

$350

D.

$490

Question 33

Which of the following descriptions of the internal control system are indicators that risks are managed effectively?

1) Existing controls promote compliance with applicable laws and regulations.

2) The control environment is designed to address all identified risks to the organization.

3) Key controls for significant risks to the organization remain consistent over time.

4) Monitoring systems are in place to alert management to unexpected events.

Options:

A.

1 and 3.

B.

1 and 4.

C.

2 and 3.

D.

2 and 4.

Question 34

Which of the following control techniques would minimize the risk of interception during transmission in an electronic data interchange system?

1) Encryption.

2) Traffic padding.

3) Edit checks.

4) Structured data format.

Options:

A.

1 and 2 only

B.

2 and 3 only

C.

3 and 4 only

D.

1, 2, and 3 only

Question 35

Which of the following conflict resolution methods should be applied when the intention of the parties is to solve the problem by clarifying differences and attaining everyone's objectives?

Options:

A.

Accommodating.

B.

Compromising.

C.

Collaborating.

D.

Competing.

Question 36

An internal auditor has been asked to conduct an investigation involving allegations of independent contractor fraud. Which of the following controls would be least effective in detecting any potential fraudulent activity?

Options:

A.

Exception report identifying payment anomalies.

B.

Documented policy and procedures.

C.

Periodic account reconciliation of contractor charges.

D.

Monthly management review of all contractor activity.

Question 37

Which of the following statements about market signaling is correct?

1) The organization releases information about a new product generation.

2) The organization limits a challenger's access to the best source of raw materials or labor.

3) The organization announces that it is fighting a new process technology.

4) The organization makes exclusive arrangements with the channels.

Options:

A.

1 and 3 only

B.

1 and 4 only

C.

2 and 3 only

D.

2 and 4 only

Question 38

The following transactions and events occurred during the year:

- $300,000 of raw materials were purchased, of which $20,000 were returned because of defects

- $600,000 of direct labor costs were incurred.

- S750.000 of manufacturing overhead costs were incurred.

What is the organization's cost of goods sold for the year?

Options:

A.

$1.480.000

B.

$1 500 000

C.

$1,610.000

D.

$1650 000

Question 39

The management of working capital is most crucial for which of the following aspects of business?

Options:

A.

Liquidity.

B.

Profitability.

C.

Solvency.

D.

Efficiency.

Question 40

The leadership of an organization encourages employees to form voluntary problem-solving groups whereby several employees from the same work area meet regularity during work hours to discuss improvements and creative ways to reduce costs. Which of the following best describes this approach?

Options:

A.

Open-book management

B.

Quality control circles

C.

Self-managed teams

D.

Cross-functional teams

Question 41

Which of the following examples demonstrates that the internal audit activity uses descriptive analytics in its engagements?

Options:

A.

An internal auditor analyzed electricity production and sales interim reports and compiled a risk assessment.

B.

An internal auditor extracted sales data to a spreadsheet and applied judgmental analysis for sampling.

C.

An internal auditor classified solar panel sales by region and discovered unsuccessful sales

representatives.

D.

An internal auditor broke down a complex process into smaller pieces to make it more understandable.

Question 42

Division A produces a product with a variable cost of $5 per unit and an allocated fixed cost of $3 per unit The market price of the product is $15 plus 20% selling cost. Division B currently purchases this product from an external supplier but is going to purchase it from division A for $18 Which of the following methods of transfer pricing is being used?

Options:

A.

Market price.

B.

Negotiation-based.

C.

Full absorption cost

D.

Variable cost

Question 43

Which of the following statements is true with regard to information protection?

Options:

A.

All personal information, by definition is considered to be sensitive, requiring specialized controls.

B.

Information is not considered personal if it can only be linked to or used to identify an individual indirectly.

C.

Individuals who provide personal information to organizations share in the risk of inappropriate

disclosure.

D.

Good protection controls remove any restrictions on the quantity of personal information that can be collected

Question 44

Which of the following can be classified as debt investments?

Options:

A.

Investments in the capital stock of a corporation.

B.

Acquisition of government bonds.

C.

Contents of an investment portfolio.

D.

Acquisition of common of a stock corporation.

Question 45

Which of the following IT controls includes protection for mainframe computers and workstations?

Options:

A.

Change management controls

B.

Physical and environmental controls.

C.

System software controls

D.

Organization and management controls

Question 46

According to IIA guidance on IT. which of the following plans would pair the identification of critical business processes with recovery time objectives?

Options:

A.

The business continuity management charter.

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Question 47

Which of me following storage options would give the organization the best chance of recovering data?

Options:

A.

Encrypted physical copies of the data and their encryption keys are stored together at the organization and are readily available upon request

B.

Encrypted physical copies of the data are stored separately from their encryption keys and both are held in secure locations a few hours away from me organization

C.

Encrypted reports on usage and database structure changes are stored on a cloud-based. secured database that is readily accessible

D.

Encrypted copies of the data are stored in a separate secure location a few hours away while the encryption keys are stored at the organization and are readily available

Question 48

An internal auditor reviews a data population and calculates the mean, median, and range.

What is the most likely purpose of performing this analytic technique?

Options:

A.

To inform the classification of the data population.

B.

To determine the completeness and accuracy of the data.

C.

To identify whether the population contains outliers.

D.

To determine whether duplicates in the data inflate the range.

Question 49

Which of the following describes a third-party network that connects an organization specifically with its trading partners?

Options:

A.

Value-added network (VAN).

B.

Local area network (LAN).

C.

Metropolitan area network (MAN).

D.

Wide area network (WAN).

Question 50

Which of the following data analytics tools would be applied by an internal audit activity positioned at the lowest level of maturity?

Options:

A.

Workflow and data capture technology

B.

Data visualization applications.

C.

Software integrated with central data warehouse

D.

Spreadsheets.

Question 51

An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?

Options:

A.

Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters.

B.

Orders, commands and advice are sent to the subsidiaries from headquarters.

C.

People of local nationality are developed for the best positions within their own country

D.

There is a significant amount of collaboration between headquarters and subsidiaries.

Question 52

An organization uses the management-by-objectives method, whereby employee performance is based on defined goals Which of the following statements is true regarding this approach?

Options:

A.

It is particularly helpful to management when the organization is facing rapid change

B.

It is a more successful approach when adopted by mechanistic organizations

C.

It is more successful when goal-setting is performed not only by management, but by an team members, including lower-level staff.

D.

It is particularly successful in environments that are prone to having poor employer-employee relations

Question 53

Which of the following best describes the primary objective of cybersecurity?

Options:

A.

To protect the effective performance of IT general and application controls.

B.

To regulate users' behavior in the web and cloud environment.

C.

To prevent unauthorized access to information assets.

D.

To secure application of protocols and authorization routines.

Question 54

A manager decided to build his team's enthusiasm by giving encouraging talks about employee empowerment, hoping to change the perception that management should make all decisions in the department.

The manager is most likely trying to impact which of the following components of his team's attitude?

Options:

A.

Affective component.

B.

Cognition component.

C.

Thinking component.

D.

Behavioral component.

Question 55

Which of the following statements is true regarding reversing entries in an accounting cycled

Options:

A.

Reversing all previous closing adjustments is a mandatory step in the accounting cycle

B.

Reversing entries should be completed at the end of the next accounting period after recording regular transactions of the period

C.

Reversing entries are identical to the adjusting entries made in the previous period.

D.

Reversing entries are the exact opposite of the adjustments made in the previous period.

Question 56

In the years after the mind-service point of a depreciable asset which of the following depreciation methods will result in the highest depreciation expense?

Options:

A.

Sum of the years' digits

B.

Declining balance

C.

Double-declining balance

D.

Straight line

Question 57

An internal auditor is using data analytics to locus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of me following statements is true regarding this scenario?

Options:

A.

The auditor is normalizing data in preparation for analyzing it

B.

The auditor is analyzing the data in preparation for communicating the results

C.

The auditor is cleaning the data in preparation for determining which processes may tie involved

D.

The auditor is reviewing the data prior to defining the question

Question 58

When attempting to devise creative solutions to problems, team members initially should do which of the following?

Options:

A.

Suspend assumptions and negative feedback

B.

Weight suggestions based on the speaker's level of authority.

C.

Discuss the details of all options presented

D.

Provide documentation to support their positions

Question 59

How do data analysis technologies affect internal audit testing?

Options:

A.

They improve the effectiveness of spot check testing techniques

B.

They allow greater insight into high risk areas.

C.

They reduce the overall scope of the audit engagement.

D.

They increase the internal auditor's objectivity

Question 60

Which of the following types of analytics focuses less on analysis and more on condensing data into mote meaningful pieces of information?

Options:

A.

Diagnostic analytics

B.

Descriptive analytics

C.

Prescriptive analytics

D.

Predictive analytics

Question 61

Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?

Options:

A.

Data center operations manager.

B.

Response and support team.

C.

Database administrator.

D.

Network administrator.

Question 62

Based on lest results an IT auditor concluded that the organization would suffer unacceptable toss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.

Requested backup tapes were not returned from the offsite vendor in a timely manner

B.

Returned backup tapes from the offsite vendor contained empty spaces

C.

Critical systems have been Backed up more frequently than required.

D.

Critical system backup tapes are taken off site less frequently than required.

Question 63

An internal auditor observed that the organization's disaster recovery solution will make use of a code site in a town several miles away Which of the following is likely to be a characteristic of this disaster recovery solution?

Options:

A.

Data is synchronized in real lime

B.

Recovery time is expected to be less than one week

C.

Servers are not available and need to be procured

D.

Recovery resources and data restore processes have not been defined

Question 64

An internal auditor is evaluating an organization's business continuity management program According to the guidance on IT. which of the following tests would best demonstrate the ability to perform Key processes without significant problems?

Options:

A.

End-to-end testing

B.

IT systems and application walkthrough

C.

Tabletop or boardroom-style testing

D.

Desk check testing

Question 65

Which of the following is an example of an application system control?

Options:

A.

Data values fall within a prescribed range.

B.

Error listings are generated and promptly remediated.

C.

Report distribution is restricted to authorized personnel.

D.

Field amounts contain an upper or lower limit.

Question 66

Organizations mat adopt just-in-time purchasing systems often experience which of the following?

Options:

A.

A slight increase in carrying costs.

B.

A greater need for inspection of goods as the goods arrive.

C.

A greater need for linkage with a vendor s computerized order entry system.

D.

An increase in the number of suitable suppliers

Question 67

An organization's board of directors is particularly focused on positioning the organization as a leader in the industry and beating the competition.

Which of the following strategies offers the greatest alignment with the board's focus?

Options:

A.

Divesting product lines expected to have negative profitability.

B.

Increasing the diversity of strategic business units.

C.

Increasing investment in research and development for a new product.

D.

Relocating the organization's manufacturing to another country.

Question 68

Which of the following is a logical access control designed to enhance the security of a computer-based application system?

Options:

A.

User accounts will be locked alter three unsuccessful attempts to access the system

B.

Users will not be allowed to use any of their last five passwords to access the system

C.

Users will be assigned rights to access the system based on their job responsibilities

D.

Users will automatically lose access to the system after 15 minutes of inactivity

Question 69

What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical product lines across all of its markets?

Options:

A.

Export strategy

B.

Transnational strategy.

C.

Multi-domestic strategy

D.

Globalization strategy.

Question 70

Which of the following situations best applies to an organization that uses a project rather man a process to accomplish its business activities?

Options:

A.

A clothing company designs makes and sells a new item.

B.

A commercial constructor company is hired to build a warehouse.

C.

A city department sets up a new firefighter training program.

D.

A manufacturing organization acquires component parts from a contracted vendor

Question 71

When is an organic organizational structure likely to be more successful than a mechanistic organizational structure?

Options:

A.

When a manufacturing organization has stable demand for its products.

B.

When an organization is subjected to strong political and social pressures

C.

When a manufacturer has reliable resources and suppliers

D.

When an organization is infrequently affected by technological advances

Question 72

Which of the following factors is most responsible for the increasing risk that unauthorized parties may obtain or tamper with personal data?

Options:

A.

The lack of legal and industry frameworks on privacy.

B.

The absence of generally accepted privacy principles.

C.

The rapid growth and evolution of technology.

D.

The legislated need to retain sensitive personal information.

Question 73

An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.

Which of the following would be considered the most significant cyber threat to the organization?

Options:

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports.

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing the financial information of the company.

Page: 1 / 49
Total 488 questions