New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

IIA IIA-CIA-Part3 Business Knowledge for Internal Auditing Exam Practice Test

Page: 1 / 34
Total 340 questions

Business Knowledge for Internal Auditing Questions and Answers

Question 1

Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?

Options:

A.

Decentralized

B.

Centralized

C.

Departmentalized

D.

Tall structure

Question 2

An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?

Options:

A.

Duplicate testing.

B.

Joining data sources.

C.

Gap analysis.

D.

Classification

Question 3

Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?

Options:

A.

Perform gap testing.

B.

Join different data sources.

C.

Perform duplicate testing.

D.

Calculate statistical parameters.

Question 4

When determining the level of physical controls required for a workstation, which of the following factors should be considered?

Options:

A.

Ease of use.

B.

Value to the business.

C.

Intrusion prevention.

D.

Ergonomic model.

Question 5

An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?

Options:

A.

To verify that the application meets stated user requirements.

B.

To verify that standalone programs match code specifications.

C.

To verify that the application would work appropriately for the intended number of users.

D.

To verify that all software and hardware components work together as intended.

Question 6

Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?

Options:

A.

Risk tolerance

B.

Performance

C.

Threats and opportunities

D.

Governance

Question 7

Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?

Options:

A.

Draft separate audit reports for business and IT management.

B.

Conned IT audit findings to business issues.

C.

Include technical details to support IT issues.

D.

Include an opinion on financial reporting accuracy and completeness.

Question 8

Which of the following scenarios best illustrates a spear phishing attack?

Options:

A.

Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.

B.

A person posing as a representative of the company’s IT help desk called several employees and played a generic prerecorded message requesting password data.

C.

A person received a personalized email regarding a golf membership renewal, and he click a hyperlink to enter his credit card data into a fake website

D.

Many users of a social network service received fake notifications of e unique opportunity to invest in a new product.

Question 9

On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?

Options:

A.

It should be reported as an administrative expense on the income statement.

B.

It should be reported as period cost other than a product cost on the management accounts

C.

It should be reported as cost of goods sold on the income statement.

D.

It should be reported on the balance sheet as part of inventory.

Question 10

An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?

Options:

A.

Data is synchronized in real time

B.

Recovery time is expected to be less than one week

C.

Servers are not available and need to be procured

D.

Recovery resources end data restore processes have not been defined.

Question 11

Which of the following is an established systems development methodology?

Options:

A.

Waterfall.

B.

Projects in Controlled Environments (PRINCE2).

C.

Information Technology Infrastructure Library (ITIL).

D.

COBIT

Question 12

According to IIA guidance, which of the following statements is true regarding penetration testing?

Options:

A.

Testing should not be announced to anyone within the organization to solicit a real-life response.

B.

Testing should take place during heavy operational time periods to test system resilience.

C.

Testing should be wide in scope and primarily address detective management controls for identifying potential attacks.

D.

Testing should address the preventive controls and management's response.

Question 13

Which of the following describes a third-party network that connects an organization specifically with its trading partners?

Options:

A.

Value-added network (VAN).

B.

Local area network (LAN).

C.

Metropolitan area network (MAN).

D.

Wide area network (WAN).

Question 14

When would a contract be dosed out?

Options:

A.

When there's a dispute between the contracting parties

B.

When ail contractual obligations have been discharged.

C.

When there is a force majenre.

D.

When the termination clause is enacted.

Question 15

Following an evaluation of an organization's IT controls, an internal auditor suggested improving the process where results are compared against the input. Which of the following IT controls would the Internal auditor recommend?

Options:

A.

Output controls.

B.

Input controls

C.

Processing controls.

D.

Integrity controls.

Question 16

According to IIA guidance on IT, which of the following controls the routing of data packets to link computers?

Options:

A.

Operating system

B.

Control environment

C.

Network.

D.

Application program code

Question 17

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

Options:

A.

Higher cash flow and treasury balances.

B.

Higher inventory balances

C.

Higher accounts receivable.

D.

Higher accounts payable

Question 18

An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal

Auditor be most concerned about?

Options:

A.

Compliance.

B.

Privacy

C.

Strategic

D.

Physical security

Question 19

An organization was forced to stop production unexpectedly, as raw materials could not be delivered due to a military conflict in the region. Which of the following plans have most likely failed to support the organization?

Options:

A.

Just-in-time delivery plans.

B.

Backup plans.

C.

Contingency plans.

D.

Standing plans.

Question 20

At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?

Options:

A.

Project plan development.

B.

Project plan execution

C.

Integrated change control.

D.

Project quality planning

Question 21

Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?

Options:

A.

There is a greater need for organizations to rely on users to comply with policies and procedures.

B.

With fewer devices owned by the organization, there is reduced need to maintain documented policies and procedures.

C.

Incident response times are less critical in the BYOD environment, compared to a traditional environment

D.

There is greater sharing of operational risk in a BYOD environment

Question 22

Which of following best demonstrates the application of the cost principle?

Options:

A.

A company reports trading and investment securities at their market cost

B.

A building purchased last year for $1 million is currently worth ©1.2 million, but the company still reports the building at $1 million.

C.

A building purchased last year for ©1 million is currently worth £1,2 million , and the company adjusts the records to reflect the current value

D.

A company reports assets at either historical or fair value, depending which is closer to market value.

Question 23

Which of the following storage options would give the organization the best chance of recovering data?

Options:

A.

Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.

B.

Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.

C.

Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.

D.

Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readily

available.

Question 24

When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?

Options:

A.

Identification of achievable goals and timelines

B.

Analysis of the competitive environment.

C.

Plan for the procurement of resources

D.

Plan for progress reporting and oversight.

Question 25

An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?

Options:

A.

The organizational chart shows only formal relationships.

B.

The organizational chart shows only the line of authority.

C.

The organizational chart shows only the senior management positions.

D.

The organizational chart is irrelevant when testing the control environment.

Question 26

The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

1. Favorable labor efficiency variance.

2. Adverse labor rate variance.

3. Adverse labor efficiency variance.

4. Favorable labor rate variance.

Options:

A.

1 and 2

B.

1 and 4

C.

3 and A

D.

2 and 3

Question 27

An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?

Options:

A.

The organization will be unable to develop preventative actions based on analytics.

B.

The organization will not be able to trace and monitor the activities of database administers.

C.

The organization will be unable to determine why intrusions and cyber incidents took place.

D.

The organization will be unable to upgrade the system to newer versions.

Question 28

According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?

Options:

A.

Initiation.

B.

Planning.

C.

Execution.

D.

Monitoring.

Question 29

While performing an audit of a car tire manufacturing plant, an internal auditor noticed a significant decrease in the number of tires produced from the previous operating

period. To determine whether worker inefficiency caused the decrease, what additional information should the auditor request?

Options:

A.

Total tire production labor hours for the operating period.

B.

Total tire production costs for the operating period.

C.

Plant production employee headcount average for the operating period.

D.

The production machinery utilization rates.

Question 30

While conducting an audit of the accounts payable department, an internal auditor found that 3% of payments made during the period under review did not agree with the submitted invoices. Which of the following key performance indicators (KPIs) for the department would best assist the auditor in determining the significance of the test results?

Options:

A.

A KPI that defines the process owner's tolerance for performance deviations.

B.

A KPI that defines the importance of performance levels and disbursement statistics being measured.

C.

A KPI that defines timeliness with regard to reporting disbursement data errors to authorized personnel.

D.

A KPI that defines operating ratio objectives of the disbursement process.

Question 31

The chief audit executive (CAE) has been asked to evaluate the chief technology officer's proposal to outsource several key functions in the organization's IT department. Which of the following would be the most appropriate action for the CAE to determine whether the proposal aligns with the organization's strategy?

Options:

A.

Understand strategic context and evaluate whether supporting information is reliable and complete.

B.

Ascertain whether governance and approval processes are transparent, documented, and completed.

C.

Perform a due diligence review or asses management's review of provider operations.

D.

Identify key performance measures and data sources.

Question 32

Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?

Options:

A.

Requiring users to change their passwords every two years.

B.

Requiring two-step verification for all users

C.

Requiring the use of a virtual private network (VPN) when employees are out of the office.

D.

Requiring the use of up-to-date antivirus, security, and event management tools.

Question 33

According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

Options:

A.

The business continuity management charter.

B.

The business continuity risk assessment plan.

C.

The business Impact analysis plan

D.

The business case for business continuity planning

Question 34

Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?

Options:

A.

Verify completeness and accuracy.

B.

Verify existence and accuracy.

C.

Verify completeness and integrity.

D.

Verify existence and completeness.

Question 35

An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?

Options:

A.

Data analysis.

B.

Data diagnostics.

C.

Data velocity.

D.

Data normalization.

Question 36

Which of the following facilitates data extraction from an application?

Options:

A.

Application program code.

B.

Database system.

C.

Operating system.

D.

Networks.

Question 37

An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?

Options:

A.

To inform the classification of the data population.

B.

To determine the completeness and accuracy of the data.

C.

To identify whether the population contains outliers.

D.

To determine whether duplicates in the data inflate the range.

Question 38

Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?

Options:

A.

Predictive analytics.

B.

Prescriptive analytics.

C.

Descriptive analytics.

D.

Diagnostic analytics.

Question 39

Which of the following best explains why an organization would enter into a capital lease contract?

Options:

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization's free cash flow from operations

C.

To Improve the organization's free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Question 40

Which of the following statements is true concerning the basic accounting treatment of a partnership?

Options:

A.

The initial investment of each partner should be recorded at book value.

B.

The ownership ratio identifies the basis for dividing net income and net toss.

C.

A partner's capital only changes due to net income or net loss.

D.

The basis for sharing net incomes or net kisses must be fixed.

Question 41

Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?

Options:

A.

A warm recovery plan.

B.

A cold recovery plan.

C.

A hot recovery plan.

D.

A manual work processes plan

Question 42

An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?

Options:

A.

Shoulder suiting

B.

Pharming,

C.

Phishing.

D.

Social engineering.

Question 43

Which of these instances accurately describes the responsibilities for big data governance?

Options:

A.

Management must ensure information storage systems are appropriately defined and processes to update critical data elements are clear.

B.

External auditors must ensure that analytical models are periodically monitored and maintained.

C.

The board must implement controls around data quality dimensions to ensure that they are effective.

D.

Internal auditors must ensure the quality and security of data, with a heightened focus on the riskiest data elements.

Question 44

Which of the following statements is true regarding the management-by-objectives method?

Options:

A.

Management by objectives is most helpful in organizations that have rapid changes.

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.

Management by objectives helps organizations to keep employees motivated.

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.

Question 45

Which of the following is an example of a key systems development control typically found in the In-house development of an application system?

Options:

A.

Logical access controls monitor application usage and generate audit trails.

B.

The development process is designed to prevent, detect, and correct errors that may occur.

C.

A record is maintained to track the process of data from Input, to output to storage.

D.

Business users' requirements are documented, and their achievement is monitored

Question 46

Which of the following is a sound network configuration practice to enhance information security?

Options:

A.

Change management practices to ensure operating system patch documentation is retained.

B.

User role requirements are documented in accordance with appropriate application-level control needs.

C.

Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.

D.

Interfaces reinforce segregation of duties between operations administration and database development.

Question 47

An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?

Options:

A.

Infrastructure as a Service (laaS).

B.

Platform as a Service (PaaS).

C.

Enterprise as a Service (EaaS).

D.

Software as a Service (SaaS).

Question 48

Which of the following statements is true regarding a project life cycle?

Options:

A.

Risk and uncertainty increase over the life of the project.

B.

Costs and staffing levels are typically high as the project draws to a close.

C.

Costs related to making changes increase as the project approaches completion.

D.

The project life cycle corresponds with the life cycle of the product produced by or modified by the project.

Question 49

Which of the following responsibilities would ordinary fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support.

B.

Management of infrastructure services, including network management.

C.

Physical hosting of mainframes and distributed servers

D.

End-to -end security architecture design.

Question 50

Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the

following would be a characteristic of the now highly centralized organization?

Options:

A.

Top management does little monitoring of the decisions made at lower levels.

B.

The decisions made at the lower levels of management are considered very important.

C.

Decisions made at lower levels in the organizational structure are few.

D.

Reliance is placed on top management decision making by few of the organization's departments.

Question 51

Which of the following should be included in a data privacy poky?

1. Stipulations for deleting certain data after a specified period of time.

2. Guidance on acceptable methods for collecting personal data.

3. A requirement to retain personal data indefinitely to ensure a complete audit trail,

4. A description of what constitutes appropriate use of personal data.

Options:

A.

1 and 2 only

B.

2 and 3 only

C.

1, 2 and 4 only

D.

2, 3, and 4 only

Page: 1 / 34
Total 340 questions