New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

IIA IIA-CIA-Part3-3P CIA Exam Part Three: Business Knowledge for Internal Auditing Exam Practice Test

Page: 1 / 49
Total 488 questions

CIA Exam Part Three: Business Knowledge for Internal Auditing Questions and Answers

Question 1

Listening effectiveness is best increased by:

Options:

A.

Resisting both internal and external distractions.

B.

Waiting to review key concepts until the speaker has finished talking.

C.

Tuning out messages that do not seem to fit the meeting purpose.

D.

Factoring in biases in order to evaluate the information being given.

Question 2

Import quotas that limit the quantities of goods that a domestic subsidiary can buy from its foreign parent company represent which type of barrier to the parent company?

Options:

A.

Political.

B.

Financial.

C.

Social.

D.

Tariff.

Question 3

Which of the following actions is most likely to gain support for process change?

Options:

A.

Set clear objectives.

B.

Engage the various communities of practice within the organization.

C.

Demonstrate support from senior management.

D.

Establish key competencies.

Question 4

The process of scenario planning begins with which of the following steps?

Options:

A.

Determining the trends that will influence key factors in the organization's environment.

B.

Selecting the issue or decision that will impact how the organization conducts future business.

C.

Selecting leading indicators to alert the organization of future developments.

D.

Identifying how customers, suppliers, competitors, employees, and other stakeholders will react.

Question 5

Which of the following statements is true regarding the roles and responsibilities associated with a corporate social responsibility (CSR) program?

Options:

A.

The board has overall responsibility for the internal control processes associated with the CSR program.

B.

Management has overall responsibility for the effectiveness of governance, risk management, and internal control processes associated with the CSR program.

C.

The internal audit activity is responsible for ensuring that CSR principles are integrated into the

organization's policies and procedures.

D.

Every employee has a responsibility for ensuring the success of the organization's CSR objectives.

Question 6

A supervisor receives a complaint from an employee who is frustrated about having to learn a new software

program. The supervisor responds that the new software will enable the employee to work more efficiently and with greater accuracy. This response is an example of:

Options:

A.

Empathetic listening.

B.

Reframing.

C.

Reflective listening.

D.

Dialogue.

Question 7

Which of the following statements is in accordance with COBIT?

1) Pervasive controls are general while detailed controls are specific.

2) Application controls are a subset of pervasive controls.

3) Implementation of software is a type of pervasive control.

4) Disaster recovery planning is a type of detailed control.

Options:

A.

1 and 4 only

B.

2 and 3 only

C.

2, 3, and 4 only

D.

1, 2, and 4 only

Question 8

All of the following are possible explanations for a significant unfavorable material efficiency variance except:

Options:

A.

Cutbacks in preventive maintenance.

B.

An inadequately trained and supervised labor force.

C.

A large number of rush orders.

D.

Production of more units than planned for in the master budget.

Question 9

An organization is considering the outsourcing of its business processes related to payroll and information technology functions. Which of the following is the most significant area of concern for management regarding this proposed agreement?

Options:

A.

Ensuring that payments to the vendor are appropriate and timely for the services delivered.

B.

Ensuring that the vendor has complete management control of the outsourced process.

C.

Ensuring that there are means of monitoring the efficiency of the outsourced process.

D.

Ensuring that there are means of monitoring the effectiveness of the outsourced process.

Question 10

Which of the following is a strategy that organizations can use to stimulate innovation?

1) Source from the most advanced suppliers.

2) Establish employee programs that reward initiative.

3) Identify best practice competitors as motivators.

4) Ensure that performance targets are always achieved.

Options:

A.

1 and 3 only

B.

2 and 4 only

C.

1, 2, and 3 only

D.

1, 2, 3, and 4

Question 11

When assessing the adequacy of a risk mitigation strategy, an internal auditor should consider which of the following?

1) Management’s tolerance for specific risks.

2) The cost versus benefit of implementing a control.

3) Whether a control can mitigate multiple risks.

4) The ability to test the effectiveness of the control.

Options:

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Question 12

Which of the following should an organization consider when developing strategic objectives for its business processes?

1) Contribution to the success of the organization.

2) Reliability of operational information.

3) Behaviors and actions expected of employees.

4) How inputs combine with outputs to generate activities.

Options:

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 4 only

D.

3 and 4 only

Question 13

Which is the least effective form of risk management?

Options:

A.

Systems-based preventive control.

B.

People-based preventive control.

C.

Systems-based detective control.

D.

People-based detective control.

Question 14

International marketing activities often begin with:

Options:

A.

Standardization.

B.

Global marketing.

C.

Limited exporting.

D.

Domestic marketing.

Question 15

Which of the following standards would be most useful in evaluating the performance of a customer-service group?

Options:

A.

The average time per customer inquiry should be kept to a minimum.

B.

Customer complaints should be processed promptly.

C.

Employees should maintain a positive attitude when dealing with customers.

D.

All customer inquiries should be answered within seven days of receipt.

Question 16

Which of the following methods, if used in conjunction with electronic data interchange (EDI), will improve the organization's cash management program, reduce transaction data input time and errors, and allow the organization to negotiate discounts with EDI vendors based on prompt payment?

Options:

A.

Electronic funds transfer.

B.

Knowledge-based systems.

C.

Biometrics.

D.

Standardized graphical user interface.

Question 17

The cost to enter a foreign market would be highest in which of the following methods of global expansion?

Options:

A.

Joint ventures.

B.

Licensing.

C.

Exporting.

D.

Overseas production.

Question 18

Which of the following is false with regard to Internet connection firewalls?

Options:

A.

Firewalls can protect against computer viruses.

B.

Firewalls monitor attacks from the Internet.

C.

Firewalls provide network administrators tools to retaliate against hackers.

D.

Firewalls may be software-based or hardware-based.

Question 19

Which of the following techniques is the most relevant when an internal auditor conducts a valuation of an organization's physical assets?

Options:

A.

Observation.

B.

Inspection.

C.

Original cost.

D.

Vouching.

Question 20

Which of the following factors would reduce dissatisfaction for a management trainee but would not particularly motivate the trainee?

Options:

A.

A sense of achievement.

B.

Promotion.

C.

Recognition.

D.

An incremental increase in salary.

Question 21

Multinational organizations generally spend more time and effort to identify and evaluate:

Options:

A.

Internal strengths and weaknesses.

B.

Break-even points.

C.

External trends and events.

D.

Internal risk factors.

Question 22

Which of the following is not a potential area of concern when an internal auditor places reliance on spreadsheets developed by users?

Options:

A.

Increasing complexity over time.

B.

Interface with corporate systems.

C.

Ability to meet user needs.

D.

Hidden data columns or worksheets.

Question 23

Which of the following statements about market signaling is correct?

1) The organization releases information about a new product generation.

2) The organization limits a challenger's access to the best source of raw materials or labor.

3) The organization announces that it is fighting a new process technology.

4) The organization makes exclusive arrangements with the channels.

Options:

A.

1 and 3 only

B.

1 and 4 only

C.

2 and 3 only

D.

2 and 4 only

Question 24

Where complex problems need to be addressed, which of the following communication networks would be most appropriate?

Options:

A.

Chain.

B.

All-channel.

C.

Circle.

D.

Wheel.

Question 25

During the last year, an organization had an opening inventory of $300,000, purchases of $980,000, sales of $1,850,000, and a gross margin of 40 percent. What is the closing inventory if the periodic inventory system is used?

Options:

A.

$170,000

B.

$280,000

C.

$300,000

D.

$540,000

Question 26

A global business organization is selecting managers to post to various international (expatriate) assignments.

In the screening process, which of the following traits would be required to make a manager a successful expatriate?

1) Superior technical competence.

2) Willingness to attempt to communicate in a foreign language.

3) Ability to empathize with other people.

Options:

A.

1 and 2 only

B.

1 and 3 only

C.

2 and 3 only

D.

1, 2, and 3

Question 27

Which of the following must be adjusted to index a progressive tax system to inflation?

Options:

A.

Tax deductions, exemptions, and tax filings.

B.

Tax deductions, exemptions, and tax brackets.

C.

Tax brackets, tax deductions, and tax payments.

D.

Tax brackets, exemptions, and nominal tax receipts.

Question 28

An organization decided to install a motion detection system in its warehouse to protect against after-hours theft. According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?

Options:

A.

Avoidance.

B.

Reduction.

C.

Elimination.

D.

Sharing.

Question 29

Which of the following are appropriate functions for an IT steering committee?

1) Assess the technical adequacy of standards for systems design and programming.

2) Continually monitor of the adequacy and accuracy of software and hardware in use.

3) Assess the effects of new technology on the organization`s IT operations.

4) Provide broad oversight of implementation, training, and operation of new systems.

Options:

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Question 30

Which of the following costs would be incurred in an inventory stockout?

Options:

A.

Lost sales, lost customers, and backorder.

B.

Lost sales, safety stock, and backorder.

C.

Lost customers, safety stock, and backorder.

D.

Lost sales, lost customers, and safety stock.

Question 31

Which of the following is an example of a risk avoidance response?

Options:

A.

Buying an insurance policy to protect against loss events.

B.

Hedging against natural gas price fluctuations.

C.

Selling a non-strategic business unit.

D.

Outsourcing a high risk process to a third party.

Question 32

Which of the following is an element of effective negotiating?

Options:

A.

Ensuring that the other party has a personal stake in the agreement.

B.

Focusing on interests rather than on obtaining a winning position.

C.

Considering a few select choices during the settlement phase.

D.

Basing the agreement on negotiating power and positioning leverage.

Question 33

The decision to implement enhanced failure detection and back-up systems to improve data integrity is an example of which risk response?

Options:

A.

Risk acceptance.

B.

Risk sharing.

C.

Risk avoidance.

D.

Risk reduction.

Question 34

Which of the following stages of group development is associated with accepting team responsibilities?

Options:

A.

Forming stage.

B.

Performing stage.

C.

Norming stage.

D.

Storming stage.

Question 35

At what point during the systems development process should an internal auditor verify that the new application's connectivity to the organization's other systems has been established correctly?

Options:

A.

Prior to testing the new application.

B.

During testing of the new application.

C.

During implementation of the new application.

D.

During maintenance of the new application.

Question 36

Which of the following IT strategies is most effective for responding to competitive pressures created by the marketplace?

Options:

A.

Promote closer linkage between organizational strategy and information.

B.

Provide users with greater online access to information systems.

C.

Enhance the functionality of application systems.

D.

Expand the use of automated controls.

Question 37

Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?

Options:

A.

Intranet.

B.

Extranet.

C.

Digital subscriber line.

D.

Broadband.

Question 38

An organization has a complex systems infrastructure consisting of multiple internally developed, off the shelf, and purchased but significantly customized applications. Some of these applications share databases or process data that is used by another stand-alone application, and interfaces have been written to move data between these applications as needed through batch processing Which of the following situations presents the greatest risk exposure given this environment?

Options:

A.

Documentation of each system and its interactions, interfaces, and dependencies with other systems and databases is not gathered and maintained.

B.

Batch processing jobs include key financial data that is not posted to the accounting system until the next day. preventing real-time queries.

C.

The job scheduling tool frequently malfunctions, causing scheduled jobs not to run. An error message is sent to IT personnel when a job fails.

D.

The implementation of a major update for a key application is delayed until any potential

interdependencies are identified and analyzed.

Question 39

Which of the following IT controls includes protection for mainframe computers and workstations?

Options:

A.

Change management controls

B.

Physical and environmental controls.

C.

System software controls

D.

Organization and management controls

Question 40

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

Options:

A.

Session hijacking.

B.

Jailbreaking.

C.

Eavesdropping.

D.

Authentication.

Question 41

Organization X owns a 38 percent equity stake in Organization Y. Which of the following statements is true regarding the financial treatment for this relationship?

Options:

A.

Y should be listed as an investment asset on X's balance sheet

B.

X must consolidate the financial statements for both organizations

C.

Y should be reported as a footnote to X's financial statements

D.

Y should not be reported by X as X does not have a controlling interest

Question 42

According to IIA guidance, which of the following statements is true regarding analytical procedures?

Options:

A.

Data relationships are assumed to exist and to continue where no known conflicting conditions exist.

B.

Analytical procedures are intended primarily to ensure the accuracy of the information being examined.

C.

Data relationships cannot include comparisons between operational and statistical data

D.

Analytical procedures can be used to identify unexpected differences but cannot be used to identify the absence of differences

Question 43

Which of following best demonstrates the application of the cost principle?

Options:

A.

A company reports trading and investment securities at their market cost.

B.

A building purchased last year for $1 million is currently worth $1.2 million, but the company still reports the building at $1 million.

C.

A building purchased last year for $1 million is currently worth $1.2 million, and the company adjusts the records to reflect the current value.

D.

A company reports assets at either historical or fair value, depending which is closer to market value.

Question 44

An organization requires an average of 58 days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?

Options:

A.

26 days.

B.

90 days.

C.

100 days.

D.

110 days.

Question 45

Which of the following assists in ensuring mat information exchanged over IT systems is encrypted?

Options:

A.

Operating system

B.

Utility software

C.

Firewall

D.

Application software

Question 46

Which of the following statements is true regarding user-developed applications (UDAs)?

Options:

A.

UDAs are less flexible and more difficult to configure than traditional IT applications.

B.

Updating UDAs may lead to various errors resulting from changes or corrections.

C.

UDAs typically are subjected to application development and change management controls.

D.

Using UDAs typically enhances the organization's ability to comply with regulatory factors.

Question 47

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

Options:

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity.

Question 48

Which of the following is the best example of IT governance controls?

Options:

A.

Controls that focus on segregation of duties, financial and change management

B.

Personnel policies that define and enforce conditions for staff in sensitive IT areas

C.

Standards that support IT policies by more specifically defining required actions

D.

Controls that focus on data structures and the minimum level of documentation required

Question 49

Organizations mat adopt just-in-time purchasing systems often experience which of the following?

Options:

A.

A slight increase in carrying costs.

B.

A greater need for inspection of goods as the goods arrive.

C.

A greater need for linkage with a vendor s computerized order entry system.

D.

An increase in the number of suitable suppliers

Question 50

Which of the following statements about mentoring is true?

1) Mentoring can be used effectively for increasing employee retention

2) Mentoring can be used effectively in reducing employees frustration.

3) Mentoring can be used effectively for increasing organization communication.

4) Mentoring can be used effectively as a short term activity consisting of instruction and training

Options:

A.

1 2. and 3 only.

B.

1. 2 and 4 only

C.

1, 3. and 4 only.

D.

1,2. 3, and 4

Question 51

Which of the following security controls focuses most on prevention of unauthorized access to the power plant?

Options:

A.

An offboarding procedure is initiated monthly to determine redundant physical access rights

B.

Logs generated by smart locks are automatically scanned to identify anomalies in access patterns

C.

Requests for additional access rights are sent for approval and validation by direct supervisors

D.

Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours

Question 52

Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?

Options:

A.

A list of trustworthy good traffic and a list of unauthorized blocked traffic.

B.

Monitoring for vulnerabilities based on industry intelligence

C.

Comprehensive service level agreements with vendors.

D.

Firewall and other network penmeter protection tools.

Question 53

Which of the following application controls verifies the accuracy of transaction results in a system?

Options:

A.

Input controls

B.

Output controls

C.

Processing controls

D.

Integrity controls

Question 54

Which of the following devices best controls both physical and logical access to information systems?

Options:

A.

Plenum.

B.

Biometric lock.

C.

Identification card.

D.

Electromechanical lock.

Question 55

An organization is experiencing a high turnover. Which of the following can human resources deploy to effectively detect the root cause of turnover?

Options:

A.

Require regular performance appraisals

B.

Perform exit interviews

C.

Encourage periodic rotation of employee duties.

D.

Ensure mandatory vacations

Question 56

Which of the following is true of bond financing, compared to common stock, when all other variables are equal?

Options:

A.

Lower shareholder control.

B.

Lower indebtedness.

C.

Higher company earnings per share.

D.

Higher overall company earnings.

Question 57

An organization's board of directors is particularly focused on positioning the organization as a leader in the industry and beating the competition.

Which of the following strategies offers the greatest alignment with the board's focus?

Options:

A.

Divesting product lines expected to have negative profitability.

B.

Increasing the diversity of strategic business units.

C.

Increasing investment in research and development for a new product.

D.

Relocating the organization's manufacturing to another country.

Question 58

Which of the following authentication controls combines what a user knows with the unique characteristics of the user respectively?

Options:

A.

Voice recognition and token.

B.

Password and fingerprint.

C.

Fingerprint and voice recognition

D.

Password and token

Question 59

Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?

Options:

A.

The cash dividends received increase the investee investment account accordingly.

B.

The investee must adjust the investment account by the ownership interest.

C.

The investment account is adjusted downward by the percentage of ownership.

D.

The investee must record the cash dividends as dividend revenue.

Question 60

Which of the following should be included m a company's year-end inventory valuation?

Options:

A.

Company goods that were sold during the year free on board shipping point that have been shipped but not yet received by the customer

B.

Goods purchased by the company free on board destination mat have not yet been received

C.

Goods on consignment, which the company is trying to sell for its customers

D.

Company goods tor sale on consignment at a consignment shop

Question 61

In accounting, which of the following statements is true regarding the terms debit and credit?

Options:

A.

Debit indicates the right side of an account and credit the left side.

B.

Debit means an increase in an account and credit means a decrease.

C.

Credit indicates the right side of an account and debit the left side.

D.

Credit means an increase in an account and debit means a decrease.

Question 62

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?

Options:

A.

The auditor eliminated duplicate information.

B.

The auditor organized data to minimize useless information.

C.

The auditor made data usable for a specific purpose by ensuring that anomalies were identified and corrected.

D.

The auditor ensured data fields were consistent and that data could be used for a specific purpose.

Question 63

Which of the following is a cybersecurity monitoring activity that involves assessing the strength of an organization's IT protection?

Options:

A.

Boundary defense

B.

Malware defense

C.

Penetration tests

D.

Wireless access controls

Question 64

Which of the following IT operational areas is responsible for the integrity of data flow within an

organization?

Options:

A.

Network

B.

Database

C.

Operating system

D.

Server

Question 65

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organization's systems?

Options:

A.

Boundary defense.

B.

Malware defense.

C.

Penetration tests.

D.

Wireless access controls.

Question 66

During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?

Options:

A.

Initiation phase.

B.

Bidding phase.

C.

Development phase.

D.

Negotiation phase

Question 67

Much of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?

Options:

A.

A traditional key lock

B.

A biometric device.

C.

A card-key system

D.

A proximity device

Question 68

A multinational organization has multiple divisions that sell their products internally to other divisions. When selling internally, which of the following transfer prices would lead to the best decisions for the organization?

Options:

A.

Full cost

B.

Full cost plus a markup.

C.

Market price of the product

D.

Variable cost plus a markup

Question 69

Which of the following is an example of a physical control?

Options:

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization's critical data

Question 70

The following transactions and events occurred during the year:

- $300,000 of raw materials were purchased, of which $20,000 were returned because of defects

- $600,000 of direct labor costs were incurred.

- S750.000 of manufacturing overhead costs were incurred.

What is the organization's cost of goods sold for the year?

Options:

A.

$1.480.000

B.

$1 500 000

C.

$1,610.000

D.

$1650 000

Question 71

Which of the following data analytics tools would be applied by an internal audit activity positioned at the lowest level of maturity?

Options:

A.

Workflow and data capture technology

B.

Data visualization applications.

C.

Software integrated with central data warehouse

D.

Spreadsheets.

Question 72

An internal auditor observed that the organization's disaster recovery solution will make use of a code site in a town several miles away Which of the following is likely to be a characteristic of this disaster recovery solution?

Options:

A.

Data is synchronized in real lime

B.

Recovery time is expected to be less than one week

C.

Servers are not available and need to be procured

D.

Recovery resources and data restore processes have not been defined

Question 73

Which of the following is the first step an internal audit activity should undertake when executing a data analytics process?

Options:

A.

Conduct a risk assessment regarding the effectiveness of the data analytics process.

B.

Analyze possible and available sources of raw data

C.

Define the purpose and the anticipated value

D.

Select data for cleaning and normalization procedures.

Page: 1 / 49
Total 488 questions