According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Security.
Status.
Recognition.
Relationship with coworkers
Herzberg's Two-Factor Theory of Motivation divides workplace factors into:
Hygiene factors (which prevent dissatisfaction but do not increase satisfaction) – e.g., salary, security, relationships.
Motivators (which drive job satisfaction and performance) – e.g., recognition, achievement, responsibility, and personal growth.
Employees most often mention recognition as a key factor in job satisfaction, as it directly impacts motivation and engagement.
(A) Incorrect – Security.
Job security is a hygiene factor, meaning its absence causes dissatisfaction, but its presence does not create job satisfaction.
(B) Incorrect – Status.
Status is a hygiene factor, not a motivator. It prevents dissatisfaction but does not enhance motivation significantly.
(C) Correct – Recognition.
Recognition is a motivator, meaning it actively increases job satisfaction and is frequently cited by happy employees.
(D) Incorrect – Relationship with coworkers.
Work relationships are hygiene factors. While poor relationships can lead to dissatisfaction, strong relationships alone do not create motivation.
IIA’s Global Internal Audit Standards – Human Resources and Organizational Behavior
Discusses motivation theories and their impact on employee performance.
Herzberg’s Two-Factor Theory of Motivation
Identifies recognition as a primary factor for employee satisfaction.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following activities best illustrates a user's authentication control?
Identity requests are approved in two steps.
Logs are checked for misaligned identities and access rights.
Users have to validate their identity with a smart card.
Functions can toe performed based on access rights
Authentication control is a security measure used to verify the identity of users before granting access to systems or data. Authentication methods ensure that only authorized individuals can access resources.
Why Option C (Users have to validate their identity with a smart card) is Correct:
Authentication is the process of verifying a user’s identity before granting access.
Smart card authentication is a strong authentication method because it requires a physical device (smart card) and a PIN or biometric verification.
This falls under multi-factor authentication (MFA), enhancing security by combining something the user has (smart card) with something they know (PIN).
Why Other Options Are Incorrect:
Option A (Identity requests are approved in two steps):
Incorrect because this refers to identity approval (authorization), not authentication.
Option B (Logs are checked for misaligned identities and access rights):
Incorrect because log monitoring is a detective control, not an authentication control.
Option D (Functions can be performed based on access rights):
Incorrect because this describes authorization (determining what a user can do after authentication).
IIA GTAG – "Auditing Identity and Access Management": Covers authentication methods like smart cards and multi-factor authentication.
COBIT 2019 – DSS05 (Manage Security Services): Recommends strong authentication controls, including smart card validation.
NIST Cybersecurity Framework – "Access Control Guidelines": Highlights authentication best practices, including smart card use.
IIA References:
When determining the level of physical controls required for a workstation, which of the following factors should be considered?
Ease of use.
Value to the business.
Intrusion prevention.
Ergonomic model.
When determining the level of physical controls required for a workstation, the most critical factor is its value to the business. Physical controls are security measures implemented to protect assets from unauthorized access, damage, or theft.
Asset Value → Determines the level of protection required.
Risk Assessment → Identifies threats like theft, sabotage, or natural disasters.
Compliance Requirements → Ensures alignment with security regulations and best practices.
(A) Ease of use.
Incorrect: While user-friendliness is important, security measures are primarily based on asset value and risk, not convenience.
IIA Standard 2110 (Governance) emphasizes security over ease of use.
(B) Value to the business. (Correct Answer)
The higher the workstation's importance to business operations, the stronger the physical controls required.
Workstations handling sensitive data or critical systems require additional security.
COSO ERM – Risk Assessment requires evaluating asset value when designing security controls.
(C) Intrusion prevention.
Partially correct but secondary: Intrusion prevention is one of many security concerns, but the primary driver for determining physical controls is the asset’s business value.
(D) Ergonomic model.
Incorrect: Ergonomics is about user comfort and efficiency, not security.
IIA Standard 2120 – Risk Management: Requires risk-based decision-making, including evaluating asset value.
GTAG 9 – Identity and Access Management: Stresses that security measures must align with asset value and business risk.
COSO ERM – Risk Assessment: Establishes asset value as a key determinant in risk-based security controls.
Factors Considered in Physical Security Decisions:Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because the level of physical controls should be determined based on how critical the workstation is to business operations.
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Lower costs.
Slower decision making at the senior executive level.
Limited creative freedom in lower-level managers.
Senior-level executives more focused on short-term, routine decision making
A flatter organizational structure reduces hierarchical levels and promotes greater autonomy for employees. The primary benefit is cost reduction due to fewer management layers and streamlined decision-making.
Fewer Management Layers – Reduces the number of mid-level managers, decreasing salary expenses.
Increased Operational Efficiency – Less bureaucracy leads to faster decision-making, lowering administrative costs.
Encourages Employee Autonomy – Reduces dependence on supervision, improving productivity.
B. Slower decision-making at the senior executive level – Incorrect because flatter structures lead to faster decision-making due to fewer approval levels.
C. Limited creative freedom in lower-level managers – Incorrect because flatter structures provide more autonomy and innovation opportunities.
D. Senior-level executives more focused on short-term, routine decision-making – Incorrect because executives in a flatter structure focus on strategic, high-level decisions, delegating routine tasks.
IIA’s GTAG on Governance and Risk Management – Discusses the financial and operational impacts of different organizational structures.
COSO’s Enterprise Risk Management (ERM) Framework – Emphasizes how flatter structures reduce operational inefficiencies and costs.
COBIT 2019 (Governance Framework) – Highlights the impact of organizational structure on financial performance.
Why Lower Costs is the Correct Answer?Why Not the Other Options?IIA References:
Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?
First-in. first-out method (FIFO).
Last-in, first-out method (LIFO).
Specific identification method.
Average-cost method
The FIFO (First-In, First-Out) method values inventory based on the assumption that older, lower-cost inventory is sold first, leaving newer, higher-cost inventory in stock. During periods of rising prices, FIFO results in lower cost of goods sold (COGS) and higher net income, making it susceptible to manipulation by management.
(A) Correct – First-in, first-out method (FIFO).
FIFO lowers COGS when older, cheaper inventory is sold first, inflating net income.
Management can manipulate earnings by selectively selling older, lower-cost inventory.
(B) Incorrect – Last-in, first-out method (LIFO).
LIFO assumes newer, higher-cost inventory is sold first, resulting in higher COGS and lower net income.
LIFO is typically used to reduce taxable income, not to inflate net income.
(C) Incorrect – Specific identification method.
This method tracks the exact cost of each unit, eliminating the ability to manipulate costs easily.
(D) Incorrect – Average-cost method.
The average-cost method smooths out fluctuations in inventory costs, preventing significant income manipulation.
IIA’s Global Internal Audit Standards – Financial Reporting and Inventory Valuation Risks
Discusses inventory accounting methods and their impact on financial statements.
IFRS and GAAP Accounting Standards – Inventory Valuation
Defines how FIFO can be used to influence financial performance.
COSO’s ERM Framework – Financial Manipulation Risks
Identifies inventory valuation as an area where earnings management can occur.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
A company records income from an investment in common stock when it does which of the following?
Purchases bonds.
Receives interest.
Receives dividends
Sells bonds.
When a company invests in common stock, it can earn income in two primary ways:
Dividend income: When the company receives dividends, it recognizes the income.
Capital gains: When the stock is sold for a higher price than its purchase price, it results in a gain.
Why Option C (Receives dividends) is Correct:
Dividends represent income from an investment in common stock when declared and paid by the issuing company.
Under GAAP and IFRS, dividend income is recognized when received, not when declared.
Companies record dividends as investment income in their income statement.
Why Other Options Are Incorrect:
Option A (Purchases bonds):
Incorrect because purchasing bonds is an investment transaction, not income recognition.
Option B (Receives interest):
Incorrect because interest income applies to bond investments, loans, or deposits, not common stock investments.
Option D (Sells bonds):
Incorrect because selling bonds results in capital gains or losses, not regular investment income from common stock.
IIA Practice Guide – "Auditing Investment & Treasury Activities": Discusses the recognition of investment income.
IFRS 9 (Financial Instruments) & GAAP Standards: Provide guidance on recording dividends as investment income.
COSO Internal Control – Integrated Framework: Emphasizes proper financial reporting and income recognition.
IIA References:
Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
Last-in-first-Out (LIFO}.
Average cost.
First-in-first-out (FIFO).
Specific identification
The specific identification method is an inventory costing approach where the actual cost of each individual unit sold is recorded. This method is used when items are uniquely identifiable, such as in industries dealing with luxury goods, automobiles, or custom-manufactured products.
Correct Answer (D - Specific identification)
Under the specific identification method, each inventory unit is tracked separately, and its actual purchase cost is assigned to the cost of goods sold (COGS) when sold.
This method is commonly used for high-value, low-volume items where unique tracking is feasible.
The IIA’s GTAG 8: Audit of Inventory Management explains how different costing methods impact financial reporting and internal controls.
Why Other Options Are Incorrect:
Option A (LIFO - Last-in, First-out):
LIFO assumes that the most recent (last-in) inventory is sold first, but it does not track actual unit cost. Instead, it assigns the cost of the newest inventory to COGS.
LIFO is often used for tax benefits but does not follow actual unit cost identification.
Option B (Average cost):
The weighted average cost method calculates an average cost for all inventory units rather than assigning actual unit costs.
This method smooths out price fluctuations but does not track specific items' costs.
Option C (FIFO - First-in, First-out):
FIFO assumes that the oldest (first-in) inventory is sold first, assigning its cost to COGS.
However, like LIFO, it does not track individual unit costs.
IIA GTAG 8: Audit of Inventory Management – Explains different inventory costing methods, including specific identification.
IIA Practice Guide: Assessing Inventory Risks – Covers inventory valuation and fraud risks.
Step-by-Step Explanation:IIA References for Validation:Thus, the specific identification method (D) is the only one that accounts for the actual cost paid for each unit sold.
Which of the following best explains the matching principle?
Revenues should be recognized when earned.
Revenue recognition is matched with cash.
Expense recognition is tied to revenue recognition.
Expenses are recognized at each accounting period.
The matching principle is a fundamental accounting concept that ensures that expenses are recorded in the same period as the revenues they help generate.
Why Option C (Expense recognition is tied to revenue recognition) is Correct:
The matching principle states that expenses should be recognized in the same period as the revenue they help generate to ensure accurate financial reporting.
This principle is applied in accrual accounting under GAAP and IFRS, ensuring that expenses and revenues are properly aligned.
Why Other Options Are Incorrect:
Option A (Revenues should be recognized when earned):
This describes the revenue recognition principle, not the matching principle.
Option B (Revenue recognition is matched with cash):
Incorrect because the matching principle applies to accrual accounting, not cash accounting. Revenue can be recognized before cash is received.
Option D (Expenses are recognized at each accounting period):
Incorrect because expenses are not necessarily recognized in every period; they are matched to revenue.
IIA Practice Guide – "Auditing Financial Reporting Controls": Discusses the importance of the matching principle.
GAAP & IFRS Accounting Standards: Define and require the application of the matching principle.
COSO Internal Control Framework: Emphasizes revenue-expense alignment for accurate financial reporting.
IIA References:
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?
Variable entity approach.
Control ownership.
Risk and reward.
Voting interest.
Under International Financial Reporting Standards (IFRS 10 – Consolidated Financial Statements), an entity is required to consolidate its financial statements based on the control principle rather than ownership percentage alone.
Why Option B (Control ownership) is Correct:
According to IFRS 10, consolidation is required when an entity has control over another entity.
Control is defined as having power over the investee, exposure to variable returns, and the ability to influence those returns.
Even if an entity owns less than 50% of voting rights, it may still have control through contractual arrangements, rights over key decisions, or majority board influence.
Why Other Options Are Incorrect:
Option A (Variable entity approach):
This is a concept used in U.S. GAAP (ASC 810 – Variable Interest Entities) rather than IFRS. IFRS focuses on the broader control model.
Option C (Risk and reward):
IFRS previously considered risk and reward under IAS 27/SIC-12, but IFRS 10 replaced this with the control model.
Option D (Voting interest):
Voting rights alone do not determine consolidation under IFRS. Control can exist even without majority voting rights through contractual arrangements or potential voting rights.
IFRS 10 – Consolidated Financial Statements: Defines the principle of control for consolidation.
IIA GTAG – "Auditing Financial Reporting Risks": Discusses the impact of IFRS consolidation principles.
COSO ERM Framework: Emphasizes risk assessment in financial reporting, including consolidation decisions.
IIA References:Thus, the correct answer is B. Control ownership.
Which of the following lists best describes the classification of manufacturing costs?
Direct materials, indirect materials, raw materials.
Overhead costs, direct labor, direct materials.
Direct materials, direct labor, depreciation on factory buildings.
Raw materials, factory employees' wages, production selling expenses.
Manufacturing costs are classified into three main categories: direct materials, direct labor, and manufacturing overhead. These categories help organizations determine product costs, pricing strategies, and financial reporting.
Why Option B (Overhead costs, direct labor, direct materials) is Correct:
Direct materials: Raw materials used directly in production (e.g., wood for furniture).
Direct labor: Labor costs directly tied to production (e.g., factory workers assembling a product).
Manufacturing overhead: Indirect costs related to production (e.g., depreciation, factory utilities, maintenance).
These categories align with GAAP, IFRS, and cost accounting standards.
Why Other Options Are Incorrect:
Option A (Direct materials, indirect materials, raw materials):
"Indirect materials" and "raw materials" are part of manufacturing overhead and direct materials, respectively, but do not form a primary cost classification.
Option C (Direct materials, direct labor, depreciation on factory buildings):
Depreciation on factory buildings is an overhead cost, not a separate category.
Option D (Raw materials, factory employees' wages, production selling expenses):
Selling expenses are not part of manufacturing costs; they are part of operating expenses.
IIA Practice Guide – Auditing Cost Management: Defines manufacturing cost classifications.
IFRS & GAAP Cost Accounting Standards: Outline manufacturing cost components.
COSO Framework – Cost Control Guidelines: Emphasizes accurate cost allocation in financial reporting.
IIA References:
Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze,
improve, and control. Which of the following best describes this approach?
Six Sigma,
Quality circle.
Value chain analysis.
Theory of constraints.
The Define, Measure, Analyze, Improve, and Control (DMAIC) methodology is the core framework of Six Sigma, a data-driven process improvement approach that aims to reduce defects, enhance efficiency, and optimize performance.
(A) Correct – Six Sigma.
DMAIC is a structured Six Sigma methodology used for problem-solving and process improvement.
It helps organizations identify inefficiencies, eliminate errors, and standardize processes.
(B) Incorrect – Quality circle.
A quality circle is a group of employees who meet to discuss and resolve work-related issues, but it does not follow the structured DMAIC approach.
(C) Incorrect – Value chain analysis.
Value chain analysis focuses on evaluating business activities to improve competitive advantage, not structured process improvement like Six Sigma.
(D) Incorrect – Theory of constraints.
The Theory of Constraints (TOC) focuses on identifying and eliminating bottlenecks in processes, but it does not use the DMAIC approach.
IIA’s Global Internal Audit Standards – Process Improvement and Risk Management
Emphasizes methodologies like Six Sigma for operational efficiency.
COSO’s ERM Framework – Continuous Improvement and Quality Management
Discusses the role of Six Sigma in improving processes and reducing risks.
IIA’s Guide on Business Process Auditing
Recommends structured approaches such as Six Sigma for evaluating process efficiency.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
IT database administrator.
IT data center manager.
IT help desk function.
IT network administrator.
Maintaining the infrastructure for a real-time database backup involves ensuring that backups are correctly configured, continuously running, and fail-safe mechanisms are in place to prevent data loss. The most appropriate role for this responsibility is the IT database administrator (DBA) because:
Primary Role of a DBA:
The DBA is responsible for managing database performance, availability, backup strategies, and recovery processes.
Ensures that real-time backups are functioning properly and failure risks are mitigated.
Database Infrastructure & Backup Strategies:
DBAs configure, monitor, and troubleshoot real-time backup solutions such as replication, mirroring, and log shipping.
They work with backup tools like Oracle Data Guard, SQL Server Always On, and MySQL replication.
Disaster Recovery & Data Integrity:
The DBA ensures data consistency and integrity, especially during system failures or cyber incidents.
They set up recovery point objectives (RPO) and recovery time objectives (RTO) for database resilience.
Option B (IT Data Center Manager):
Oversees physical and environmental infrastructure (e.g., servers, cooling, and power systems). Not directly responsible for database backup failure prevention. (Incorrect)
Option C (IT Help Desk Function):
Provides user support and troubleshooting but does not manage backup infrastructure. (Incorrect)
Option D (IT Network Administrator):
Manages network configurations, security, and connectivity but does not handle database backup infrastructure. (Incorrect)
IIA GTAG – "Auditing Business Continuity and Disaster Recovery": Emphasizes the role of DBAs in backup infrastructure.
COBIT 2019 – BAI10.02 (Manage Backup and Restore): Assigns database backup management responsibilities primarily to DBAs.
IIA's "Auditing IT Operations": Recommends that database administration teams ensure backup mechanisms are tested regularly.
Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. IT database administrator.
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and
telecommunications, but does not have servers or infrastructure equipment?
Frozen site
Cold site
Warm site
Hot site
An IT disaster recovery plan (DRP) ensures business continuity by defining backup and recovery sites. These sites differ based on their level of readiness.
Let’s analyze the answer choices:
Option A: Frozen site
Incorrect. "Frozen site" is not a recognized term in IT disaster recovery planning. The three common categories are cold, warm, and hot sites.
Option B: Cold site
Correct.
A cold site is a designated recovery location that provides only basic facilities such as power, space, internet, and telecommunications.
It does not include servers, infrastructure, or pre-installed systems, meaning that it requires significant setup time before becoming operational.
IIA Reference: Business continuity and IT risk management frameworks classify cold sites as a cost-effective but slower disaster recovery option. (IIA GTAG: Business Continuity Management)
Option C: Warm site
Incorrect. A warm site includes some pre-installed hardware and software, allowing faster recovery compared to a cold site.
Option D: Hot site
Incorrect. A hot site is fully operational with real-time data replication, enabling an immediate switchover in case of disaster.
What is the primary risk associated with an organization adopting a decentralized structure?
Inability to adapt.
Greater costs of control function.
Inconsistency in decision making.
Lack of resilience.
A decentralized structure distributes decision-making authority across different business units, divisions, or geographical locations. While decentralization provides flexibility and autonomy, the primary risk is inconsistency in decision-making, as different units may develop their own policies, processes, and priorities that are not aligned with the organization's strategic goals.
(A) Inability to adapt.
Incorrect. Decentralization typically enhances adaptability, as individual units can quickly respond to local market conditions, customer needs, and emerging risks without waiting for corporate approval.
(B) Greater costs of control function.
Partially correct but not the primary risk. While decentralization may increase oversight costs (e.g., more auditors and compliance personnel), the primary issue is lack of uniform decision-making rather than costs alone.
(C) Inconsistency in decision making. ✅
Correct. When decision-making authority is spread across various units, inconsistencies arise in areas such as risk management, compliance, operational procedures, and resource allocation. This can lead to conflicts, inefficiencies, and misalignment with corporate strategy.
IIA Standard 2120 – Risk Management emphasizes the need for consistent risk oversight in all business units.
IIA GTAG "Auditing the Control Environment" warns that inconsistent policies weaken internal controls and governance.
(D) Lack of resilience.
Incorrect. A decentralized structure often improves resilience because decision-making is spread out, reducing dependency on a central authority. This allows units to function independently if one area experiences disruption.
IIA Standard 2120 – Risk Management
IIA GTAG – "Auditing the Control Environment"
COSO Framework – Internal Control Principles
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as decentralization introduces decision-making inconsistencies, affecting governance and strategic alignment.
Which of the following IT layers would require the organization to maintain communication with a vendor in a tightly controlled and monitored manner?
Applications
Technical infrastructure.
External connections.
IT management
Organizations that rely on third-party vendors for IT services must ensure secure and controlled communication, especially in areas where external connections are involved. External connections typically include:
Cloud services (e.g., SaaS, PaaS, IaaS)
Third-party APIs
Remote access (VPNs, firewalls, network gateways)
IoT devices and external sensors
These connections introduce cybersecurity risks, requiring continuous monitoring, vendor communication, and security controls.
(A) Applications.
Incorrect. While application security is important, it is typically managed internally. Vendor involvement is needed for software patches and updates, but communication is not as tightly monitored.
(B) Technical infrastructure.
Incorrect. This layer includes internal IT components like servers, databases, and networks, which are mostly managed in-house. Vendor involvement is required for hardware/software updates but not to the same extent as external connections.
(C) External connections. ✅
Correct. External connections require tightly controlled communication with vendors to prevent security breaches, unauthorized access, and data leaks.
IIA GTAG "Auditing IT Governance" highlights third-party risk management as a key area for IT audits.
IIA Standard 2110 requires organizations to establish governance structures for vendor and IT security management.
(D) IT management.
Incorrect. IT management focuses on internal oversight of IT policies and compliance, but does not necessarily require tightly controlled vendor communication.
IIA GTAG – "Auditing IT Governance"
IIA GTAG – "Managing Third-Party Risks"
IIA Standard 2110 – Governance
Analysis of Answer Choices:IIA References:
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Lawfulness.
Consideration.
Agreement.
Discharge
Consideration is a fundamental element of a legally binding contract, referring to something of value exchanged between parties. It ensures that each party receives a benefit or suffers a legal detriment in return for the promise made.
Essential for Contract Enforceability – A contract must involve an exchange of value (e.g., money, services, goods, or a promise to act or refrain from acting).
Legal Reciprocity – Both parties must give and receive something of value to make the contract valid.
Distinguishes Contracts from Gifts – A gift is voluntary and does not require consideration, whereas a contract does.
A. Lawfulness – A contract must be lawful, but lawfulness is a requirement, not something exchanged.
C. Agreement – An agreement is part of a contract, but without consideration, an agreement is not legally binding.
D. Discharge – Discharge refers to ending a contract, not forming one.
IIA’s GTAG on Contract Management Risks – Highlights consideration as a key contract principle.
COSO’s Internal Control Framework – Covers contract law fundamentals in risk management.
Common Law and Uniform Commercial Code (UCC) – Define consideration as an essential element of a contract.
Why Consideration is the Correct Answer?Why Not the Other Options?IIA References:
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?
Incremental processing costs, incremental revenue, and variable manufacturing expenses.
Joint costs, incremental processing costs, and variable manufacturing expenses.
Incremental revenue, joint costs, and incremental processing costs.
Variable manufacturing expenses, incremental revenue, and joint costs
When deciding whether to sell a product as-is or process it further, a manufacturer should consider only relevant costs—those that will change based on the decision.
Why Option A (Incremental processing costs, incremental revenue, and variable manufacturing expenses) is Correct:
Incremental processing costs: These are additional costs required to process the material further, making them directly relevant.
Incremental revenue: The additional revenue that would be generated if the product is processed further is a key factor in decision-making.
Variable manufacturing expenses: These costs change with production levels, making them important in the decision-making process.
Why Other Options Are Incorrect:
Option B (Joint costs, incremental processing costs, and variable manufacturing expenses):
Incorrect because joint costs (costs incurred before the split-off point) are sunk costs and are not relevant in the decision.
Option C (Incremental revenue, joint costs, and incremental processing costs):
Incorrect because, again, joint costs are not relevant to the decision.
Option D (Variable manufacturing expenses, incremental revenue, and joint costs):
Incorrect because joint costs should be ignored in a sell-or-process-further decision.
IIA GTAG – "Auditing Cost Accounting Decisions": Discusses relevant costs in decision-making.
IFRS & GAAP Cost Accounting Standards: Explain cost classification and decision-making.
COSO Internal Control – Integrated Framework: Recommends proper cost allocation methods for financial decisions.
IIA References:
An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data.
What would be the most appropriate directive control in this area?
Require a Service Organization Controls (SOC) report from the service provider
Include a data protection clause in the contract with the service provider.
Obtain a nondisclosure agreement from each employee at the service provider who will handle sensitive data.
Encrypt the employees ' data before transmitting it to the service provider
A directive control is a policy, procedure, or guideline that establishes expected behavior to mitigate risks. In the context of outsourcing HR functions, a data protection clause in the contract ensures that the service provider is legally obligated to protect sensitive employee data.
Legal and Regulatory Compliance – It ensures the service provider complies with GDPR, CCPA, ISO 27001, SOC 2, and other data protection laws.
Defines Security Responsibilities – Specifies encryption, access controls, data retention policies, and penalties for non-compliance.
Enforceable Accountability – The contract holds the provider accountable for data breaches or misuse.
Industry Best Practice – Most outsourcing agreements include a Data Processing Agreement (DPA) as part of contractual terms.
A. Require a SOC report – A SOC (Service Organization Control) report assesses the provider’s internal controls, but it does not enforce compliance.
C. Obtain a nondisclosure agreement (NDA) – An NDA is useful, but it only prevents individuals from sharing data; it does not define data security requirements.
D. Encrypt the employees' data before transmitting it – Encryption is a strong preventive control, but it does not provide a directive policy like a contract clause does.
IIA’s International Professional Practices Framework (IPPF) – Standard 2201 – Requires internal auditors to assess contract terms related to risk management.
COSO’s Enterprise Risk Management (ERM) Framework – Recommends contractual agreements for third-party risk mitigation.
ISO 27001 Annex A.15.1.2 – Specifies that security requirements must be addressed in supplier contracts.
Why a Data Protection Clause Is the Most Appropriate Directive Control?Why Not the Other Options?IIA References:✅ Final Answer: B. Include a data protection clause in the contract with the service provider. (Most appropriate directive control).
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
Theory of constraints.
Just-in-time method.
Activity-based costing.
Break-even analysis
The Just-in-Time (JIT) method is a managerial accounting and inventory management strategy that focuses on reducing or eliminating excess inventory by receiving goods only as needed.
(A) Theory of constraints.
Incorrect: The theory of constraints focuses on identifying and managing bottlenecks in production, not reducing inventory levels.
(B) Just-in-time method. (Correct Answer)
JIT aims to reduce waste, lower storage costs, and improve efficiency by ensuring that materials and products arrive only when needed.
IIA GTAG 3 – Continuous Auditing suggests monitoring inventory controls to align with JIT principles.
(C) Activity-based costing.
Incorrect: Activity-based costing allocates costs to activities based on usage, not inventory reduction.
(D) Break-even analysis.
Incorrect: Break-even analysis calculates the level of sales needed to cover costs but does not focus on inventory management.
IIA Standard 2120 – Risk Management: Encourages auditors to assess cost-management strategies like JIT.
IIA GTAG 3 – Continuous Auditing: Supports real-time monitoring of inventory to minimize excess stock.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) Just-in-Time (JIT) method, as it focuses on achieving low or no inventory to optimize efficiency and reduce costs.
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the
following would be a characteristic of the now highly centralized organization?
Top management does little monitoring of the decisions made at lower levels.
The decisions made at the lower levels of management are considered very important.
Decisions made at lower levels in the organizational structure are few.
Reliance is placed on top management decision making by few of the organization's departments.
A highly centralized organization is one where decision-making authority is concentrated at the top management level, with lower levels having minimal autonomy. This change means that most critical decisions are made at the corporate level, and lower-level managers have limited decision-making power.
(A) Incorrect – Top management does little monitoring of the decisions made at lower levels.
In a centralized organization, top management monitors and controls most decisions.
This statement applies more to decentralized structures where decision-making is distributed.
(B) Incorrect – The decisions made at the lower levels of management are considered very important.
In a centralized structure, decisions made at lower levels hold less significance since authority is concentrated at the top.
(C) Correct – Decisions made at lower levels in the organizational structure are few.
Centralized structures limit decision-making power at lower levels, keeping control with top executives.
Lower-level managers mostly follow directives from upper management rather than making independent decisions.
(D) Incorrect – Reliance is placed on top management decision-making by few of the organization’s departments.
In a centralized system, most (not just a few) departments rely on top management for decision-making.
IIA’s Global Internal Audit Standards – Organizational Governance and Decision-Making
Explains centralized vs. decentralized structures and their impact on risk management.
COSO’s ERM Framework – Governance and Decision Authority
Discusses the implications of centralization on strategic decision-making.
IIA’s Guide on Corporate Governance and Internal Control Frameworks
Highlights the effect of centralization on accountability, oversight, and risk management.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.
Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
When an organization integrates governance, risk, and compliance (GRC) activities into a centralized technology-based resource, enterprise governance must ensure that the system:
Supports strategic decision-making by the board and senior management.
Provides accurate, reliable, and quality information to demonstrate an effective governance framework.
Aligns with IIA Standard 2110 – Governance, which requires auditors to assess whether the organization’s governance structure supports accountability, transparency, and effective decision-making.
(A) The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided. (Correct Answer)
Governance is about ensuring that stakeholders, particularly the board, have confidence in the organization's control environment and decision-making process.
IIA Standard 2110 (Governance) states that internal auditors must evaluate the adequacy and effectiveness of governance structures.
A GRC system should ensure transparency, accountability, and quality reporting to enable strategic governance oversight.
(B) Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
While improving efficiency is a benefit of a GRC system, it is a secondary objective, not a primary enterprise governance concern.
(C) Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
Tracking risk metrics is useful but does not directly address governance at the board level, making this answer incomplete.
(D) Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
Analytics support monitoring, but the core governance concern is ensuring the board’s confidence in the system.
IIA Standard 2110 – Governance: Internal auditors must assess whether governance processes are effective.
GTAG 1 – Information Technology Risks and Controls: IT governance must provide quality, reliable information for decision-making.
COSO ERM Framework: Emphasizes governance as a key driver of enterprise risk management.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (A) because effective enterprise governance relies on accurate and high-quality information for strategic decision-making.
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Cold recovery plan,
Outsourced recovery plan.
Storage area network recovery plan.
Hot recovery plan
A hot recovery plan (hot site) is a fully operational, duplicate site that is pre-configured and ready for immediate use in case of a disaster. This approach allows an organization to recover critical operations quickly with minimal downtime.
(A) Cold recovery plan.
Incorrect: A cold site is a facility that has infrastructure but no active IT systems or data until set up after a disaster, resulting in longer recovery times.
(B) Outsourced recovery plan.
Incorrect: Outsourcing recovery refers to third-party disaster recovery services, but does not specifically describe a fully operational duplicate site.
(C) Storage area network recovery plan.
Incorrect: A storage area network (SAN) recovery plan focuses on data storage redundancy, not a fully operational duplicate facility.
(D) Hot recovery plan. (Correct Answer)
A hot site is the fastest and most effective disaster recovery solution, ensuring immediate failover with minimal downtime.
IIA GTAG 10 – Business Continuity Management highlights hot sites as the most effective for mission-critical operations.
IIA GTAG 10 – Business Continuity Management: Recommends hot sites for critical recovery scenarios.
IIA Standard 2120 – Risk Management: Emphasizes preparedness for disaster recovery planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) Hot recovery plan, as it ensures a fully operational backup site for immediate disaster recovery.
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
HTTP sites provide sufficient security to protect customers' credit card information.
Web servers store credit cardholders' information submitted for payment.
Database servers send cardholders’ information for authorization in clear text.
Payment gatewaysauthorizecredit cardonlinepayments.
E-commerce transactions involve multiple security layers to ensure the protection of customers' sensitive financial information. The correct answer is D, as payment gateways serve as intermediaries that authorize online credit card transactions by securely transmitting the payment details to the bank or card networks for approval. Let’s examine each option carefully:
Option A: HTTP sites provide sufficient security to protect customers' credit card information.
Incorrect. HyperText Transfer Protocol (HTTP) does not provide encryption, meaning that data transmitted over an HTTP connection can be intercepted by malicious actors. Instead, Secure HTTP (HTTPS), which uses Secure Sockets Layer (SSL) or Transport Layer Security (TLS), is required to encrypt the data.
IIA Reference: Internal auditors evaluating e-commerce security should verify that organizations use HTTPS for secure transactions. (IIA GTAG: Information Security Governance)
Option B: Web servers store credit cardholders' information submitted for payment.
Incorrect. While web servers may temporarily process customer data, they should not store sensitive credit card information due to security risks. Instead, organizations follow the Payment Card Industry Data Security Standard (PCI DSS), which mandates secure storage and encryption protocols.
IIA Reference: IIA Standards recommend compliance with PCI DSS to protect sensitive payment information. (IIA Practice Guide: Auditing IT Governance)
Option C: Database servers send cardholders’ information for authorization in clear text.
Incorrect. Transmitting cardholder data in clear text is a severe security vulnerability. Secure encryption protocols such as SSL/TLS or tokenization must be used to protect data in transit.
IIA Reference: Internal auditors should ensure encryption measures are in place for financial transactions. (IIA GTAG: Auditing Cybersecurity Risk)
Option D: Payment gateways authorize credit card online payments.
Correct. Payment gateways act as secure intermediaries between merchants and payment processors, verifying the transaction details before authorization. This ensures a secure transaction by encrypting sensitive data before transmitting it for approval.
IIA Reference: IIA guidance on IT controls emphasizes the importance of secure payment processing through payment gateways. (IIA GTAG: Managing and Auditing IT Vulnerabilities)
Which of the following describes a third-party network that connects an organization specifically with its trading partners?
Value-added network (VAN).
Local area network (LAN).
Metropolitan area network (MAN).
Wide area network (WAN).
A Value-Added Network (VAN) is a third-party network service that securely connects an organization with its trading partners, facilitating secure electronic data interchange (EDI) and business communications.
(A) Value-added network (VAN). (Correct Answer)
A VAN is a private, managed network service that provides secure data transmission between business partners.
It is commonly used for B2B transactions, supply chain management, and EDI.
IIA GTAG 7 – IT Outsourcing recognizes VANs as critical third-party networks for secure business data exchange.
(B) Local area network (LAN).
Incorrect: A LAN connects computers within a limited area (e.g., an office or building), but it is not designed for external trading partner connections.
(C) Metropolitan area network (MAN).
Incorrect: A MAN covers a city or region, but it is not designed for B2B communication.
(D) Wide area network (WAN).
Incorrect: A WAN connects multiple geographic locations, but it is a general networking term, not specific to trading partner communications.
IIA GTAG 7 – IT Outsourcing: Discusses the use of third-party networks like VANs for secure data exchange.
IIA Standard 2110 – Governance: Recommends secure third-party integration for business continuity and security.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (A) Value-Added Network (VAN) because it is specifically designed for secure communication between an organization and its trading partners.
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
Estimate time required to complete the whole project.
Determine the responses to expected project risks.
Break the project into manageable components.
Identify resources needed to complete the project
The first step in a project management plan is to break the project into manageable components, known as Work Breakdown Structure (WBS). This step ensures clarity, task allocation, and effective tracking.
(A) Estimate time required to complete the whole project.
Incorrect: Time estimation comes after breaking the project into smaller tasks.
(B) Determine the responses to expected project risks.
Incorrect: Risk management is important but is planned after defining project tasks and scope.
(C) Break the project into manageable components. (Correct Answer)
Dividing the project into smaller tasks (WBS) helps in resource allocation, scheduling, and risk assessment.
IIA GTAG 12 – Project Risk Management suggests using WBS to define tasks clearly.
(D) Identify resources needed to complete the project.
Incorrect: Resources can only be allocated effectively after defining project components.
IIA GTAG 12 – Project Risk Management: Recommends Work Breakdown Structure (WBS) as the first step in project planning.
PMBOK (Project Management Body of Knowledge): Defines WBS as the foundation of project planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (C) Break the project into manageable components, as this is the first step in structuring and planning a successful project.
An analytical model determined that on Friday and Saturday nights the luxury brands stores should be open for extended hours and with a doubled number of employees
present; while on Mondays and Tuesdays costs can be minimized by reducing the number of employees to a minimum and opening only for evening hours Which of the
following best categorizes the analytical model applied?
Descriptive.
Diagnostic.
Prescriptive.
Prolific.
Descriptive Analytics – Answers "What happened?" by summarizing past data.
Diagnostic Analytics – Answers "Why did it happen?" by identifying causes of trends or issues.
Prescriptive Analytics – Answers "What should we do?" by providing data-driven recommendations and optimal solutions for decision-making.
Prolific Analytics – This is not a recognized category in standard analytics models.
The model makes specific recommendations for store operations (extended hours, staffing adjustments).
It optimizes resource allocation based on demand patterns.
It goes beyond identifying past trends (descriptive) or diagnosing causes (diagnostic) and provides actionable solutions.
A. Descriptive – Would only summarize sales data but not suggest changes.
B. Diagnostic – Would explain why luxury stores see higher traffic on weekends but would not recommend actions.
D. Prolific – Not a standard analytics category.
IIA’s GTAG on Data Analytics – Describes prescriptive analytics as the highest level of business intelligence, driving decision-making.
COSO’s Enterprise Risk Management (ERM) Framework – Encourages data-driven decision-making using prescriptive models.
COBIT 2019 on IT Governance – Recommends leveraging prescriptive analytics for operational efficiency.
Types of Analytical Models in Business Intelligence:Why Prescriptive Analytics is the Best Choice?Why Not the Other Options?IIA References:✅ Final Answer: C. Prescriptive.
Which of the following best describes owner's equity?
Assets minus liabilities.
Total assets.
Total liabilities.
Owners contribution plus drawings.
Owner’s equity represents the residual interest in a company’s assets after deducting liabilities. It is a fundamental concept in financial accounting, reflecting the net worth of a business.
Formula:Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Represents the True Value of Ownership – It measures the owner's claim on the business after settling all obligations.
Directly Tied to the Accounting Equation – Assets=Liabilities+Owner’s Equity\text{Assets} = \text{Liabilities} + \text{Owner’s Equity}Assets=Liabilities+Owner’s Equity Rearranging the equation: Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Commonly Used in Financial Statements – Found in the Balance Sheet under the "Equity" section.
B. Total assets – Incorrect because assets include both owner-financed and liability-financed resources.
C. Total liabilities – Incorrect because liabilities represent debts owed, not ownership value.
D. Owner’s contribution plus drawings – Incorrect because it only considers investments and withdrawals, not retained earnings or net assets.
IIA’s GTAG on Business Financial Management – Discusses financial statement analysis, including owner’s equity.
COSO’s Internal Control – Integrated Framework – Highlights financial reporting accuracy, including equity calculations.
IFRS & GAAP Accounting Standards – Define owner’s equity as assets minus liabilities in financial reporting.
Why Option A is Correct?Why Not the Other Options?IIA References:
An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
A balanced scorecard.
A quality audit
Earned value analysis.
Trend analysis
Earned Value Analysis (EVA) is a project management technique that integrates scope, time, and cost data to measure project performance and progress objectively. EVA allows internal auditors to assess whether a software development project is on track by comparing planned work with completed work and actual costs.
Here’s why EVA is the most appropriate choice:
Evaluates Project Progress and Performance – EVA measures how much work has been completed against the planned schedule and budget, helping auditors analyze project efficiency.
Identifies Deviations – It highlights cost overruns or delays in task completion, which is critical for software development projects.
Uses Key Metrics – EVA includes essential indicators like:
Planned Value (PV) – The budgeted cost of work scheduled.
Earned Value (EV) – The value of actual work performed.
Actual Cost (AC) – The real cost incurred for work completed.
Schedule Variance (SV) and Cost Variance (CV) – Indicators of deviations from planned performance.
Supports Risk-Based Internal Audit Approach – The IIA emphasizes risk-based auditing, and EVA helps auditors assess risks related to project cost overruns, schedule slippage, and performance gaps.
A. A Balanced Scorecard – This measures overall organizational performance across perspectives (financial, customer, internal processes, and learning & growth), but it is not specifically designed for evaluating project task completion.
B. A Quality Audit – This focuses on compliance with quality standards and does not measure project task completion efficiency.
D. Trend Analysis – This evaluates patterns over time but does not provide a structured measurement of project progress in terms of cost, time, and completion percentage.
The IIA’s GTAG (Global Technology Audit Guide) on IT Project Management – Recommends using earned value analysis for project auditing.
IIA’s International Professional Practices Framework (IPPF) – Performance Standard 2120 (Risk Management) – Emphasizes the need for internal auditors to evaluate the effectiveness of project risk management, which EVA supports.
COSO’s Enterprise Risk Management (ERM) Framework – Encourages structured performance measurement techniques like EVA to monitor projects.
Why Not the Other Options?IIA References:Thus, Earned Value Analysis (EVA) is the correct answer because it provides a precise, quantitative way to measure project performance. ✅
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?
Only preventive measures.
Alternative and reactive measures.
Preventive and alternative measures.
Preventive and reactive measures.
To effectively mitigate and manage risks during a crisis, organizations must implement a combination of preventive and reactive measures:
Preventive measures: These are proactive steps taken before a crisis to reduce the likelihood of occurrence (e.g., risk assessments, internal controls, security protocols).
Reactive measures: These are actions taken after a crisis occurs to minimize damage, restore operations, and recover from the event (e.g., business continuity plans, incident response strategies).
(A) Incorrect – Only preventive measures.
While prevention is essential, not all crises can be avoided. Organizations also need response mechanisms.
(B) Incorrect – Alternative and reactive measures.
Alternative measures (e.g., backup systems) are part of risk management, but without prevention, risks may escalate.
(C) Incorrect – Preventive and alternative measures.
Alternative measures (e.g., backup resources) help maintain operations but do not directly address crisis response.
(D) Correct – Preventive and reactive measures.
Best practice in risk management includes both preventing crises and responding effectively when they occur.
IIA’s Global Internal Audit Standards – Crisis Management and Business Resilience
Emphasizes the need for both prevention and response strategies.
COSO’s ERM Framework – Risk Management in Crisis Situations
Recommends a combination of risk avoidance, mitigation, and crisis response.
ISO 22301 – Business Continuity Management
Highlights the importance of preventive controls and reactive response planning.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following controls would be most efficient to protect business data from corruption and errors?
Controls to ensure data is unable to be accessed without authorization.
Controls to calculate batch totals to identify an error before approval.
Controls to encrypt the data so that corruption is likely ineffective.
Controls to quickly identify malicious intrusion attempts.
To efficiently protect business data from corruption and errors, the best approach is proactive detection through validation controls. Batch total calculations help verify data integrity before approval, ensuring errors are caught early.
(A) Controls to ensure data is unable to be accessed without authorization.
Incorrect: Access controls prevent unauthorized access, but they do not detect or prevent data corruption/errors.
(B) Controls to calculate batch totals to identify an error before approval. (Correct Answer)
Batch control totals ensure that data entries match expected values before processing, helping detect errors before approval.
IIA GTAG 3 – Continuous Auditing recommends automated validation and reconciliation checks for data integrity.
(C) Controls to encrypt the data so that corruption is likely ineffective.
Incorrect: Encryption protects data confidentiality, but it does not prevent or detect errors or corruption.
(D) Controls to quickly identify malicious intrusion attempts.
Incorrect: Intrusion detection systems focus on cybersecurity, not data corruption or errors.
IIA Standard 2120 – Risk Management: Recommends controls for error prevention and early detection.
IIA GTAG 3 – Continuous Auditing: Suggests automated validation processes like batch totals to detect errors before approval.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because batch total calculations effectively detect errors before approval, ensuring data integrity.
Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Rooting.
Eavesdropping.
Man in the middle.
Session hijacking.
Definition of Rooting:
Rooting (on Android) or Jailbreaking (on iOS) is the process of bypassing manufacturer and administrative security controls on a smart device.
This allows users to gain full control (root access) over the operating system, which can override security restrictions and allow installation of unauthorized applications.
How Rooting Increases Data Security Risks:
Bypassing Security Measures: Rooting removes built-in security protections, making the device more vulnerable to malware, unauthorized access, and data breaches.
Exposure to Malicious Apps: Rooted devices can install third-party applications that are not vetted by official app stores, increasing the risk of data theft, spyware, and ransomware attacks.
Circumventing Enterprise Security Policies: Many organizations use Mobile Device Management (MDM) to enforce security policies, but rooted devices can bypass these controls, exposing corporate data to cyber threats.
Increased Risk of Privilege Escalation Attacks: Attackers can exploit root access to take full control of the device, leading to unauthorized access to sensitive information.
IIA’s Perspective on Cybersecurity Risks:
IIA Standard 2110 – Governance emphasizes the importance of protecting sensitive data and ensuring compliance with IT security policies.
IIA’s GTAG (Global Technology Audit Guide) on Information Security warns against the dangers of rooted or jailbroken devices, as they compromise cybersecurity defenses.
NIST Cybersecurity Framework and ISO 27001 Information Security Standards identify unauthorized modifications to devices as a critical security risk.
Eliminating Incorrect Options:
B. Eavesdropping: This refers to intercepting communications (e.g., listening in on phone calls or network traffic) but does not involve circumventing administrative restrictions.
C. Man-in-the-Middle (MITM) Attack: This is an attack where an attacker intercepts and alters communication between two parties but does not involve rooting a device.
D. Session Hijacking: This attack involves stealing session tokens to impersonate a user but is unrelated to bypassing security controls on devices.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – Information Security Risks
NIST Cybersecurity Framework
ISO 27001 Information Security Standards
Which of the following is the best example of IT governance controls?
Controls that focus on segregation of duties, financial, and change management,
Personnel policies that define and enforce conditions for staff in sensitive IT areas.
Standards that support IT policies by more specifically defining required actions
Controls that focus on data structures and the minimum level of documentation required
IT governance controls ensure that an organization's IT systems align with business objectives, manage risks, and comply with regulatory requirements. These controls cover areas such as security, financial oversight, change management, and operational efficiency.
Let’s analyze each option:
Option A: Controls that focus on segregation of duties, financial, and change management.
Correct.
Segregation of duties (SoD) prevents conflicts of interest and reduces fraud risk.
Financial controls ensure IT expenditures align with budgets and policies.
Change management controls ensure system modifications follow formal approval and testing procedures.
These areas are core components of IT governance, ensuring security, compliance, and efficiency.
IIA Reference: Internal auditors evaluate IT governance using frameworks like COBIT (Control Objectives for Information and Related Technologies) and ISO 27001. (IIA GTAG: Auditing IT Governance)
Option B: Personnel policies that define and enforce conditions for staff in sensitive IT areas.
Incorrect.
While personnel policies support IT security, they do not fully represent IT governance controls. IT governance is broader and includes risk management, compliance, and operational efficiency.
Option C: Standards that support IT policies by more specifically defining required actions.
Incorrect.
Standards are part of IT governance but are not controls themselves. IT governance requires enforcement mechanisms like segregation of duties and change management to ensure compliance.
Option D: Controls that focus on data structures and the minimum level of documentation required.
Incorrect.
While data governance is a subset of IT governance, IT governance includes wider financial, security, and operational controls.
Thus, the verified answer is A. Controls that focus on segregation of duties, financial, and change management.
Which of the following responsibilities would ordinary fall under the help desk function of an organization?
Maintenance service items such as production support.
Management of infrastructure services, including network management.
Physical hosting of mainframes and distributed servers
End-to -end security architecture design.
A help desk function is responsible for providing technical support and maintenance services to end users. This includes troubleshooting issues, production support, and system maintenance rather than managing infrastructure or security architecture.
Let’s analyze each option:
Option A: Maintenance service items such as production support.
Correct. The help desk primarily provides user support, including:
Troubleshooting software and hardware issues
Resolving technical support requests
Assisting users with system access and operational questions
IIA Reference: Internal auditors assess IT service management, including help desk functions, to ensure efficient IT support and incident response. (IIA GTAG: Auditing IT Service Management)
Option B: Management of infrastructure services, including network management.
Incorrect. Infrastructure services (such as network and server management) fall under IT operations or network administration, not the help desk.
Option C: Physical hosting of mainframes and distributed servers
Incorrect. Hosting and maintaining physical servers is the responsibility of data center operations, not the help desk.
Option D: End-to-end security architecture design.
Incorrect. Security architecture design is handled by the IT security team or cybersecurity department, not the help desk.
Thus, the verified answer is A. Maintenance service items such as production support.
Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?
It calculates the overall value of a project.
It ignores the time value of money.
It calculates the time a project takes to break even.
It begins at time zero for the project.
The discounted payback period (DPP) is a capital budgeting technique that determines how long it takes for a project’s discounted cash flows to recover its initial investment. Unlike the regular payback period, the DPP accounts for the time value of money by discounting future cash flows.
(A) It calculates the overall value of a project.
Incorrect. The discounted payback period only measures how long it takes to recover the initial investment—it does not determine the overall value of a project. Net Present Value (NPV) and Internal Rate of Return (IRR) are used to evaluate a project's overall value.
(B) It ignores the time value of money.
Incorrect. Unlike the regular payback period, the discounted payback period accounts for the time value of money by discounting future cash flows using a required rate of return.
(C) It calculates the time a project takes to break even. ✅
Correct. The discounted payback period determines how long it takes for the present value of cash inflows to recover the initial investment. It helps assess the risk and liquidity of a project.
IIA GTAG "Auditing Capital Budgeting and Investment Decisions" states that discounted payback is useful for assessing the risk of projects by considering cash flow recovery time.
(D) It begins at time zero for the project.
Incorrect. The calculation starts at time zero (when the investment is made), but the method itself focuses on future discounted cash flows to determine the break-even point.
IIA GTAG – "Auditing Capital Budgeting and Investment Decisions"
COSO ERM Framework – Capital Investment Risk Management
GAAP/IFRS – Discounted Cash Flow Methods
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as the discounted payback period measures the time needed to break even after adjusting for the time value of money.
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.
Ensure that relevant access to key applications is strictly controlled through an approval and review process.
Institute detection and authentication controls for all devices used for network connectivity and data storage.
Use management software scan and then prompt parch reminders when devices connect to the network
Understanding BYOD Risks:
A Bring-Your-Own-Device (BYOD) policy allows employees to use personal devices (e.g., laptops, smartphones, tablets) for work.
This increases security risks such as unauthorized access, malware infections, data leakage, and non-compliance with IT security policies.
Why Option C (Detection and Authentication Controls) Is Correct?
Detection and authentication controls ensure that:
Only authorized devices can connect to the organization's network.
User authentication mechanisms (such as multi-factor authentication) verify identities before granting access.
Devices with security vulnerabilities are flagged and restricted.
This aligns with IIA Standard 2110 – Governance, which emphasizes IT security controls for risk mitigation.
ISO 27001 and NIST Cybersecurity Framework also recommend device authentication and monitoring for secure network access.
Why Other Options Are Incorrect?
Option A (Limit personal use of employee devices):
Limiting personal use does not fully address network security risks; malware can still infect devices.
Option B (Control access through approvals and reviews):
While access control is important, it does not mitigate the broader risks of compromised devices connecting to the network.
Option D (Software scans and patch reminders):
Patching is important, but it does not prevent unauthorized access or ensure authentication for devices.
Implementing device detection and authentication controls is the most effective way to mitigate security risks in a BYOD environment.
IIA Standard 2110 and ISO 27001 emphasize strong network security measures.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT Risk Management & BYOD Security)
ISO 27001 – Information Security Management
NIST Cybersecurity Framework – Access Control & Authentication
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An extranet
A local area network
An Intranet
The internet
An Intranet is a private network that is accessible only to an organization’s personnel. It is used for internal communication, data sharing, and collaboration while ensuring security and restricted access.
Let’s analyze each option:
Option A: An extranet
Incorrect. An extranet extends an organization’s internal network to external parties such as vendors, suppliers, or business partners. Since the organization wants to allow access only to its personnel, an extranet is not the right choice.
Option B: A local area network (LAN)
Incorrect. While a LAN is a network within a limited geographic area (such as an office), it does not necessarily restrict access only to personnel. Additionally, an intranet operates over a LAN but includes access controls and authentication mechanisms.
Option C: An Intranet
Correct. An intranet is specifically designed for internal use, allowing employees to securely share documents, collaborate, and access internal resources. Organizations can implement access control mechanisms to restrict access to authorized personnel only.
IIA Reference: Internal auditors assess IT security to ensure that internal networks (such as intranets) have appropriate access restrictions to protect sensitive data. (IIA GTAG: Auditing IT Networks)
Option D: The internet
Incorrect. The internet is a public network that does not restrict access. Using the internet for internal communication would expose sensitive data to external threats.
Thus, the verified answer is C. An Intranet.
Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?
Clothing company designs, makes, and sells a new item.
A commercial construction company is hired to build a warehouse.
A city department sets up a new firefighter training program.
A manufacturing organization acquires component parts from a contracted vendor
A project is a temporary initiative with a defined start and end date, specific objectives, and unique deliverables. Unlike ongoing business processes, projects have distinct goals, require coordination across various resources, and are not repeated continuously.
Let’s analyze each option:
Option A: A clothing company designs, makes, and sells a new item.
Incorrect.
While designing a new clothing item could be a project, the production and sale of the item are ongoing processes, not a one-time project.
Option B: A commercial construction company is hired to build a warehouse.
Correct.
Construction projects are classic examples of project-based work because:
They have a defined beginning and end.
They involve unique deliverables (a specific warehouse).
They require temporary coordination of resources.
IIA Reference: Internal auditors assess project management frameworks to ensure compliance with organizational and financial controls. (IIA Practice Guide: Auditing Project Management)
Option C: A city department sets up a new firefighter training program.
Incorrect.
If the training program is a one-time initiative, it could be considered a project. However, if the program is recurring (e.g., new firefighter training every year), it would be a process, not a project.
Option D: A manufacturing organization acquires component parts from a contracted vendor.
Incorrect.
Procurement of component parts is a continuous operational process, not a project.
Thus, the verified answer is B. A commercial construction company is hired to build a warehouse.
An organization's account for office supplies on hand had a balance of $9,000 at the end of year one. During year two. The organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11 ,500 in office supplies on hand. Based on this Information, what would he recorded in the adjusting entry an the end of year two?
A debit to office supplies on hand for S2.500
A debit to office supplies on hand for $11.500
A debit to office supplies on hand for $20,500
A debit to office supplies on hand for $42,500
Understanding the Accounting for Office Supplies:
The organization maintains an account for office supplies on hand, which represents unused office supplies at any given time.
The expense recorded during the year represents the cost of office supplies purchased.
At year-end, the adjusting entry is made to reflect the actual amount of supplies on hand and adjust the supplies expense accordingly.
Formula to Determine the Supplies Used:
Supplies Used=Beginning Balance+Purchases−Ending Balance\text{Supplies Used} = \text{Beginning Balance} + \text{Purchases} - \text{Ending Balance}Supplies Used=Beginning Balance+Purchases−Ending Balance
Plugging in the given values:
Supplies Used=9,000+45,000−11,500=42,500\text{Supplies Used} = 9,000 + 45,000 - 11,500 = 42,500Supplies Used=9,000+45,000−11,500=42,500
This amount ($42,500) represents the actual office supplies used and should be recorded as an expense.
The adjusting entry would include:
A debit to Office Supplies on Hand for $42,500
A credit to Office Supplies Expense for $42,500
Why Other Options Are Incorrect:
A. A debit to office supplies on hand for $2,500 – Incorrect, as this figure does not represent supplies used or purchased.
B. A debit to office supplies on hand for $11,500 – Incorrect, as this is the ending balance and not the adjustment amount.
C. A debit to office supplies on hand for $20,500 – Incorrect, as this does not align with the formula for calculating used supplies.
IIA’s Perspective on Financial Reporting and Adjusting Entries:
IIA Standard 1220 – Due Professional Care emphasizes accurate financial reporting and proper adjustments for year-end entries.
GAAP Accounting Principles require accrual-based adjustments to ensure that expenses are recognized in the period they are incurred.
COSO Internal Control Framework supports proper inventory and expense adjustments to avoid misstated financials.
IIA References:
IIA Standard 1220 – Due Professional Care (Financial Reporting Accuracy)
GAAP Accounting Standards – Adjusting Entries for Supplies and Inventory
COSO Internal Control – Accurate Expense Recognition
Thus, the correct and verified answer is D. A debit to office supplies on hand for $42,500.
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
26 days.
90 days,
100 days.
110 days
Understanding the Cash Conversion Cycle (CCC):
The Cash Conversion Cycle (CCC) measures the time taken for a company to convert raw materials into cash flow.
CCC is calculated using the formula: CCC=DaysInventoryOutstanding(DIO)+DaysSalesOutstanding(DSO)−DaysPayableOutstanding(DPO)CCC = Days Inventory Outstanding (DIO) + Days Sales Outstanding (DSO) - Days Payable Outstanding (DPO)CCC=DaysInventoryOutstanding(DIO)+DaysSalesOutstanding(DSO)−DaysPayableOutstanding(DPO)
Where:
DIO (Days Inventory Outstanding) = 55 days (time to convert raw materials to finished products).
DSO (Days Sales Outstanding) = 42 days (time to collect receivables).
DPO (Days Payable Outstanding) = 10 days (time to pay for raw materials).
Applying the Formula:
CCC=55+42−10CCC = 55 + 42 - 10CCC=55+42−10 CCC=100 daysCCC = 100 \text{ days}CCC=100 days
Why Option C (100 Days) Is Correct?
The CCC represents the time the company’s cash is tied up in production and sales before receiving payment.
This calculation aligns with IIA Standard 2120 – Risk Management, which requires auditors to assess financial liquidity and operational efficiency.
Why Other Options Are Incorrect?
Option A (26 days): Incorrect calculation.
Option B (90 days): Does not subtract DPO correctly.
Option D (110 days): Incorrect addition of all components instead of following the CCC formula.
The correct cash conversion cycle is 100 days, calculated using standard CCC methodology.
IIA Standard 2120 and financial management principles confirm the correct calculation.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management (Financial Performance & Liquidity Risk)
COSO ERM – Working Capital & Cash Flow Management
Financial Management Best Practices – Cash Conversion Cycle Analysis
According to IIA guidance, which of the following statements is true regarding analytical procedures?
Data relationships are assumed to exist and to continue where no known conflicting conditions exist.
Analytical procedures are intended primarily to ensure the accuracy of the information being examined.
Data relationships cannot include comparisons between operational and statistical data
Analytical procedures can be used to identify unexpected differences, but cannot be used to identify the absence of differences
Analytical procedures involve evaluating financial and operational data by examining plausible relationships between numbers, trends, and industry benchmarks. These procedures assume that data relationships exist and will continue unless there is evidence to the contrary.
(A) Data relationships are assumed to exist and to continue where no known conflicting conditions exist. ✅
Correct. Analytical procedures rely on historical trends and logical relationships between data (e.g., revenue vs. expenses, payroll vs. employee count). If no unusual variations or red flags are observed, auditors assume continuity.
IIA GTAG "Auditing Business Intelligence" supports the assumption that data relationships persist unless evidence suggests otherwise.
(B) Analytical procedures are intended primarily to ensure the accuracy of the information being examined.
Incorrect. The primary goal of analytical procedures is not absolute accuracy but rather identifying trends, anomalies, and risks that require further investigation.
(C) Data relationships cannot include comparisons between operational and statistical data.
Incorrect. Operational and statistical data are commonly used in analytical procedures (e.g., comparing production output with raw material consumption, or customer transactions with website visits).
IIA GTAG "Data Analytics: Elevating Internal Audit Performance" highlights the importance of using both financial and operational data in analytical testing.
(D) Analytical procedures can be used to identify unexpected differences, but cannot be used to identify the absence of differences.
Incorrect. Analytical procedures can identify both unexpected variances and expected consistency. Auditors analyze trends, seasonal fluctuations, and relationships, detecting both errors and missing anomalies.
IIA GTAG – "Auditing Business Intelligence"
IIA GTAG – "Data Analytics: Elevating Internal Audit Performance"
IIA Standard 2320 – Analysis and Evaluation
Analysis of Answer Choices:IIA References:Thus, the correct answer is A, as analytical procedures assume data relationships exist and continue unless conflicting conditions arise.
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization's critical data
A physical control is a security measure designed to protect assets, facilities, and personnel from physical threats such as fire, theft, or unauthorized access. Fire detection and suppression equipment (e.g., fire alarms, sprinklers, extinguishers) directly protects physical assets, making it a clear example of a physical control.
(A) Providing fire detection and suppression equipment. ✅
Correct. This is a direct physical security control that helps mitigate fire risks by detecting and suppressing fires.
IIA GTAG "Physical Security and IT Asset Protection" identifies fire detection as an essential physical security measure.
(B) Establishing a physical security policy and promoting it throughout the organization. ❌
Incorrect. A policy is an administrative control, not a physical control. While important, it does not provide direct physical protection.
(C) Performing business continuity and disaster recovery planning. ❌
Incorrect. This is a procedural control, not a physical one. Planning for disasters does not physically secure assets but instead prepares an organization for recovery.
(D) Keeping an offsite backup of the organization's critical data. ❌
Incorrect. This is an IT security control, ensuring data availability rather than physically protecting assets.
IIA GTAG – "Physical Security and IT Asset Protection"
IIA Standard 2110 – Governance (Risk Management Controls)
COBIT Framework – Physical and Environmental Security Controls
Analysis of Answer Choices:IIA References:Thus, the correct answer is A, as fire detection and suppression equipment provides direct physical protection against fire-related risks.
Which of the following is true of matrix organizations?
A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.
A combination of product and functional departments allows management to utilize personnel from various Junctions.
Authority, responsibility and accountability of the units Involved may vary based on the project's life, or the organization's culture
It is best suited for firms with scattered locations or for multi-line, Large-scale firms.
Understanding Matrix Organizations:
A matrix organization is a hybrid structure that combines functional and project-based structures, where employees report to multiple managers (e.g., a functional manager and a project manager).
These organizations adapt to projects by adjusting authority, responsibility, and accountability based on the project's stage or the organization's culture.
Why Option C Is Correct?
In a matrix organization, roles and decision-making authority evolve based on the project's phase, size, or complexity.
Employees might report to different managers at different times, and accountability structures may change.
This aligns with IIA Standard 2110 – Governance, which emphasizes clear roles and responsibilities in dynamic organizational structures.
Why Other Options Are Incorrect?
Option A (Unity-of-command concept):
The unity-of-command principle states that employees should report to only one superior, which contradicts the nature of a matrix organization, where dual reporting exists.
Option B (Combination of product and functional departments allows management to utilize personnel from various functions):
While matrix organizations integrate product and functional departments, the key defining feature is the variable authority, responsibility, and accountability, making option C a better fit.
Option D (Best suited for firms with scattered locations or large-scale firms):
While matrix structures can be used in large firms, they are not limited to them and are often found in project-based industries (e.g., engineering, IT, consulting).
Matrix organizations adapt their authority structures based on project needs, making option C the best choice.
IIA Standard 2110 supports governance structures that evolve with organizational needs.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Organizational Structure & Accountability)
COSO ERM – Governance & Decision-Making in Matrix Organizations
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations.
Drafting a strong contract that requires regular vendor control reports end a right-to-audit clause.
Applying administrative privileges to ensure right to access controls are appropriate.
Creating a standing cyber-security committee to identify and manage risks related to data security
When an organization outsources network and data management to a third party, the first step in risk management is to ensure that the contractual agreement includes strong governance provisions, including:
Regular vendor control reports to monitor security and performance.
A right-to-audit clause, allowing the organization to periodically assess compliance and security controls.
Correct Answer (B - Drafting a Strong Contract with Vendor Control Reports & Right-to-Audit Clause)
IIA Practice Guide: Auditing Third-Party Risk Management recommends that contracts with vendors include clear security expectations, reporting requirements, and audit rights.
A right-to-audit clause allows internal auditors to verify compliance with security policies.
Vendor control reports (e.g., SOC 2 reports) provide assurance that the vendor meets security and compliance standards.
Why Other Options Are Incorrect:
Option A (Creating a comprehensive reporting system for vendors):
While useful, a reporting system alone is not the first step—it should be included after contractual protections are in place.
Option C (Applying administrative privileges to ensure appropriate access controls):
This applies to internal access management but does not address third-party risk management.
Option D (Creating a cybersecurity committee):
A cybersecurity committee helps manage ongoing risks, but contractual controls are the first step in managing third-party risk.
IIA Practice Guide: Auditing Third-Party Risk Management – Recommends strong contracts with right-to-audit clauses.
GTAG 7: Information Technology Outsourcing – Discusses vendor risk management and contractual safeguards.
Step-by-Step Explanation:IIA References for Validation:Thus, the best first step is drafting a strong contract with vendor control reports and a right-to-audit clause (B).
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Hot recovery plan
Warm recovery plan
Cold recovery plan
Absence of recovery plan
A disaster recovery plan (DRP) ensures that critical systems and data can be restored after an incident. If backup plans exist but no recovery and restore processes are defined, then the organization lacks a functional recovery plan altogether.
(A) Hot recovery plan.
Incorrect. A hot recovery plan includes real-time data replication and immediate failover systems, allowing for almost instant recovery in case of an outage. Since the scenario mentions that no restore process is defined, this cannot be a hot recovery plan.
(B) Warm recovery plan.
Incorrect. A warm recovery plan involves regular backups and a standby system that can be activated within hours or days. However, without defined restore procedures, the organization does not even have a warm recovery plan.
(C) Cold recovery plan.
Incorrect. A cold recovery plan means that backups exist but recovery takes significant time because systems and infrastructure need to be rebuilt. However, a cold plan still includes a recovery process, which the scenario lacks.
(D) Absence of recovery plan. ✅
Correct. If data backup plans exist but no restore processes are defined, then there is no functional recovery plan. Without a structured approach to data recovery, backups alone are useless in an actual disaster scenario.
IIA GTAG "Business Continuity and Disaster Recovery" highlights the need for detailed recovery processes as part of an overall disaster recovery plan.
IIA GTAG – "Business Continuity and Disaster Recovery"
IIA Standard 2120 – Risk Management
COBIT Framework – IT Disaster Recovery Controls
Analysis of Answer Choices:IIA References:Thus, the correct answer is D, as data backups without recovery procedures indicate the absence of a recovery plan.
According to IIA guidance, which of the following links computers and enables them to -communicate with each other?
Application program code
Database system
Operating system
Networks
Understanding Computer Communication Systems:
Computers communicate with each other using network infrastructure, which allows data transfer, resource sharing, and remote access.
A network connects multiple devices, enabling them to exchange information, access shared resources, and collaborate efficiently.
Why Option D (Networks) Is Correct?
A computer network consists of hardware (routers, switches, and cables) and software (protocols like TCP/IP) that facilitate communication.
Networks can be local (LAN), wide-area (WAN), or cloud-based, providing the backbone for IT operations.
IIA GTAG 11 – Developing the IT Audit Plan emphasizes auditing network security and communication controls.
Why Other Options Are Incorrect?
Option A (Application program code):
Application programs allow users to perform specific tasks but do not link computers for communication.
Option B (Database system):
A database stores and retrieves data, but it does not enable direct communication between computers.
Option C (Operating system):
The operating system manages a single computer’s resources but does not connect multiple computers.
Networks are responsible for linking computers and enabling communication, making option D the correct choice.
IIA GTAG 11 highlights the importance of network infrastructure in IT auditing.
Final Justification:IIA References:
IIA GTAG 11 – Developing the IT Audit Plan
ISO 27001 – IT Network Security Management
NIST SP 800-53 – Network Security Controls
An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety
The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
Average cost method
First-in, first-out (FIFO) method
Specific identification method
Activity-based costing method
To determine which inventory method was used, we calculate the cost of goods sold (COGS) under different inventory valuation methods.
Opening Inventory: 1,000 units @ $2 each = $2,000
Purchased: 5,000 units @ $3 each = $15,000
Total Inventory: 6,000 units
Units Sold: 3,000 at $7 per unit
Reported COGS: $8,500
Given Data:FIFO Calculation:FIFO (First-In, First-Out) assumes that the oldest inventory is sold first.
1,000 units from opening inventory @ $2 = $2,000
2,000 units from purchases @ $3 = $6,000
Total COGS under FIFO: $2,000 + $6,000 = $8,000
Average Cost Calculation:Average cost per unit =
Total Cost of InventoryTotal Units=(2,000+15,000)6,000=17,0006,000=2.83 per unit\frac{\text{Total Cost of Inventory}}{\text{Total Units}} = \frac{(2,000 + 15,000)}{6,000} = \frac{17,000}{6,000} = 2.83 \text{ per unit}Total UnitsTotal Cost of Inventory=6,000(2,000+15,000)=6,00017,000=2.83 per unit
COGS using average cost method: 3,000×2.83=8,4903,000 \times 2.83 = 8,4903,000×2.83=8,490 This is not an exact match to the reported COGS of $8,500.
Since the closest method to the reported value is FIFO ($8,000 vs. $8,500 reported COGS, accounting for possible rounding errors or additional costs), FIFO is the most likely method used.
(A) Average cost method. ❌ Incorrect. The calculated COGS using the weighted average method was $8,490, which does not match exactly with the reported COGS of $8,500.
(B) First-in, first-out (FIFO) method. ✅ Correct. The FIFO method yielded $8,000, which is the closest match to the reported COGS. Minor rounding adjustments or other expenses could explain the difference of $500.
(C) Specific identification method. ❌ Incorrect. This method applies when each inventory item is individually tracked, which is not mentioned in the question.
(D) Activity-based costing method. ❌ Incorrect. Activity-based costing (ABC) is used for overhead allocation and is not a primary inventory valuation method.
IIA GTAG – "Auditing Inventory Management"
IIA Standard 2130 – Control Activities (Inventory and Costing Methods)
GAAP and IFRS – FIFO, Weighted Average, and Specific Identification Methods
Analysis of Answer Choices:IIA References:Thus, the correct answer is B (FIFO method) because it provides the closest cost match to the reported COGS.
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
Authorization
Architecture model
Firewall
Virtual private network
Definition of a Firewall:
A firewall is a network security device (hardware or software) that monitors and controls incoming and outgoing network traffic.
It is designed to filter or prevent specific information from moving between internal and external networks, ensuring unauthorized access is blocked.
How a Firewall Works:
It uses rules and policies to determine whether to allow or block traffic.
Firewalls can be configured to prevent malware, hacking attempts, and unauthorized data transfers.
There are different types, including packet-filtering firewalls, stateful inspection firewalls, and next-generation firewalls (NGFWs).
Why Other Options Are Incorrect:
A. Authorization:
Authorization refers to user access control, ensuring users have the correct permissions, but it does not filter network traffic.
B. Architecture model:
An architecture model defines the structure of an IT system but does not actively prevent or filter data movement.
D. Virtual private network (VPN):
A VPN encrypts data and provides secure remote access but does not filter or block data movement between networks.
IIA’s Perspective on IT Security Controls:
IIA Standard 2110 – Governance emphasizes strong cybersecurity controls, including firewalls, to protect sensitive data.
IIA GTAG (Global Technology Audit Guide) on Information Security recommends using firewalls as a primary defense mechanism.
NIST Cybersecurity Framework and ISO 27001 Security Standards identify firewalls as critical tools for network security and data protection.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – Information Security Risks
NIST Cybersecurity Framework
A one-time password would most likely be generated in which of the following situations?
When an employee accesses an online digital certificate
When an employee's biometrics have been accepted.
When an employee creates a unique digital signature,
When an employee uses a key fob to produce a token.
A one-time password (OTP) is a unique, temporary password that is valid for a single login session or transaction. It is commonly used in multi-factor authentication (MFA) systems to enhance security.
Correct Answer (D - When an Employee Uses a Key Fob to Produce a Token)
Key fobs generate a time-sensitive one-time password (OTP), which is used in conjunction with a traditional password to enhance security.
These devices are part of two-factor authentication (2FA) or multi-factor authentication (MFA) methods.
The IIA GTAG 9: Identity and Access Management discusses OTP tokens as a strong security control to prevent unauthorized access.
Why Other Options Are Incorrect:
Option A (When an employee accesses an online digital certificate):
Digital certificates authenticate users or devices, but they do not generate one-time passwords.
Option B (When an employee's biometrics have been accepted):
Biometric authentication (e.g., fingerprint, facial recognition) grants access based on biological traits, not an OTP.
Option C (When an employee creates a unique digital signature):
Digital signatures authenticate documents and transactions, but they are not time-sensitive one-time passwords.
IIA GTAG 9: Identity and Access Management – Covers OTP tokens as a security measure.
IIA Practice Guide: Auditing IT Security Controls – Recommends OTPs as part of secure authentication.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because key fobs generate one-time passwords for secure authentication.
Which of the following would be a concern related to the authorization controls utilized for a system?
Users can only see certain screens in the system.
Users are making frequent password change requests.
Users Input Incorrect passwords and get denied system access
Users are all permitted uniform access to the system.
Authorization controls ensure that users have appropriate access levels based on their roles and responsibilities. The primary concern arises when all users have uniform access, as it violates the principle of least privilege (PoLP) and increases the risk of unauthorized access and data breaches.
(A) Users can only see certain screens in the system.
Incorrect. This is a good security practice, as it limits user access based on job roles, preventing unauthorized access to sensitive information.
(B) Users are making frequent password change requests.
Incorrect. Frequent password resets might indicate poor password management but are not directly related to authorization controls.
(C) Users input incorrect passwords and get denied system access.
Incorrect. This indicates authentication issues, not an authorization control concern. If users are denied access due to incorrect passwords, the system’s authentication mechanisms are working correctly.
(D) Users are all permitted uniform access to the system. ✅
Correct. Authorization should be role-based, meaning different users should have different levels of access depending on their responsibilities. Uniform access violates security best practices and increases the risk of fraud, data misuse, and compliance violations.
IIA GTAG "Identity and Access Management" emphasizes that authorization controls should be based on job functions to prevent unnecessary exposure to sensitive data.
IIA Standard 2120 – Risk Management highlights the importance of access control policies to mitigate cybersecurity risks.
IIA GTAG – "Identity and Access Management"
IIA Standard 2120 – Risk Management
COBIT Framework – Access Control and Identity Management
Analysis of Answer Choices:IIA References:Thus, the correct answer is D, as uniform access across all users is a major security concern in authorization control.
Which of the following scenarios best illustrates a spear phishing attack?
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
A person posing as a representative of the company’s IT help desk called several employees and played a generic prerecorded message requesting password data.
A person received a personalized email regarding a golf membership renewal, and he click a hyperlink to enter his credit card data into a fake website
Many users of a social network service received fake notifications of e unique opportunity to invest in a new product.
Understanding Spear Phishing Attacks:
Spear phishing is a targeted cyberattack where attackers send personalized emails to trick individuals into providing sensitive data (e.g., passwords, financial information).
Unlike regular phishing, which casts a wide net, spear phishing is highly customized and often appears to come from a trusted source.
Why Option C Is Correct?
The scenario describes a highly personalized email (related to a golf membership) that tricks the recipient into clicking a malicious hyperlink and entering sensitive data.
This matches the definition of a spear phishing attack, where an attacker tailors a scam specifically for an individual.
IIA GTAG 16 – Data Analytics and ISO 27001 emphasize the need for security awareness training to mitigate such threats.
Why Other Options Are Incorrect?
Option A (Website attack causing a server crash):
This describes a Denial-of-Service (DoS) attack, not spear phishing.
Option B (Generic recorded message requesting password data):
This is vishing (voice phishing), not spear phishing. Spear phishing relies on personalized emails.
Option D (Fake social media investment opportunity):
This describes mass phishing, which targets multiple users, unlike spear phishing, which is highly targeted.
Spear phishing is a targeted attack that uses personal details to deceive individuals, making option C the best choice.
IIA GTAG 16 and ISO 27001 emphasize cybersecurity awareness to prevent such attacks.
Final Justification:IIA References:
IIA GTAG 16 – Data Analytics in Cybersecurity Audits
ISO 27001 – Cybersecurity Best Practices
NIST SP 800-61 – Incident Response Guidelines for Phishing Attacks
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?
Greater cost-effectiveness
Increased economies of scale
Larger talent pool
Strong internal controls
A decentralized organizational structure distributes decision-making authority across different business units or geographic regions. One major advantage is the ability to tap into a larger talent pool, as decision-making is not restricted to headquarters, and leadership opportunities exist at multiple levels.
(A) Greater cost-effectiveness.
Incorrect. A decentralized structure often increases costs due to duplicate resources, additional oversight, and inefficiencies from fragmented decision-making.
(B) Increased economies of scale.
Incorrect. Centralized organizations benefit more from economies of scale because they can standardize processes and consolidate purchasing power. Decentralization reduces these benefits by spreading decision-making across multiple locations.
(C) Larger talent pool. ✅
Correct. Decentralization allows organizations to recruit, develop, and retain talent in different locations, rather than relying solely on headquarters for leadership roles.
This aligns with IIA Standard 2110 – Governance, which emphasizes the importance of leadership distribution and talent management in organizations.
(D) Strong internal controls.
Incorrect. Centralized structures typically have stronger internal controls, as decision-making and risk management are closely monitored. Decentralization increases the risk of inconsistent controls across different units.
IIA Standard 2110 – Governance
COSO Framework – Organizational Structure and Risk Management
IIA GTAG – "Auditing Business Strategy Alignment"
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as decentralization expands the talent pool by enabling local decision-making and leadership development.
A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Compare to the annual cost of capital
Compare to the annual interest data.
Compare to the required rate of return.
Compare to the net present value.
The internal rate of return (IRR) is a measure used to evaluate the profitability of an investment. The project is considered acceptable if its IRR is greater than or equal to the required rate of return (RRR), which is the minimum return an organization expects from an investment.
Correct Answer (C - Compare to the Required Rate of Return)
The required rate of return (RRR) represents the minimum acceptable return for the project.
If IRR ≥ RRR, the project is acceptable. If IRR < RRR, the project is rejected.
The IIA Practice Guide: Auditing Capital Investments suggests comparing IRR to the RRR to ensure financial feasibility.
Why Other Options Are Incorrect:
Option A (Compare to the annual cost of capital):
The cost of capital (WACC - Weighted Average Cost of Capital) is an important factor, but RRR is the direct benchmark for IRR comparison.
Option B (Compare to the annual interest rate):
Interest rates do not determine project feasibility—they only affect financing costs.
Option D (Compare to the net present value - NPV):
NPV and IRR are related, but they serve different purposes.
IRR is compared against RRR, while NPV measures absolute profitability in dollar terms.
IIA Practice Guide: Auditing Capital Investments – Discusses IRR, RRR, and investment decision-making.
IIA GTAG 3: Business Case Development – Explains how financial metrics like IRR and RRR are used in decision-making.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because IRR should be compared to the required rate of return to determine project acceptability.
An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?
Use of a central processing unit
Use of a database management system
Use of a local area network
Use of electronic data Interchange
Electronic Data Interchange (EDI) refers to the computer-to-computer exchange of business documents (such as purchase orders, invoices, and shipping notices) in a standard electronic format between business partners.
Correct Answer (D - Use of Electronic Data Interchange)
EDI enables real-time, automated business transactions between companies, reducing errors and increasing efficiency.
The IIA GTAG 8: Audit of Inventory Management highlights EDI as a critical system for supply chain and procurement operations.
Why Other Options Are Incorrect:
Option A (Use of a Central Processing Unit - CPU):
A CPU is a hardware component, not a method for exchanging business documents.
Option B (Use of a Database Management System - DBMS):
A DBMS stores and manages data but does not facilitate external document exchange between trading partners.
Option C (Use of a Local Area Network - LAN):
A LAN connects computers within an organization but does not enable document exchange between separate businesses.
IIA GTAG 8: Audit of Inventory Management – Discusses EDI as an essential tool for automating business transactions.
IIA Practice Guide: Auditing IT Controls – Recommends EDI for secure and efficient document exchange.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because EDI is the best system for automated, computer-to-computer business document exchange.
Which of the following best explains why an organization would enter into a capital lease contract?
To increase the ability to borrow additional funds from creditors
To reduce the organization's free cash flow from operations
To Improve the organization's free cash flow from operations
To acquire the asset at the end of the lease period at a price lower than the fair market value
A capital lease (now referred to as a finance lease under IFRS 16 and ASC 842) is a leasing arrangement where an organization records the leased asset and liability on its balance sheet as if it were owned. Organizations enter into capital leases to improve financial metrics, including free cash flow from operations.
Let’s analyze each option:
Option A: To increase the ability to borrow additional funds from creditors
Incorrect. A capital lease creates a liability on the balance sheet, which may reduce borrowing capacity rather than increase it.
Option B: To reduce the organization's free cash flow from operations
Incorrect.
Operating leases impact operating cash flow because lease payments are treated as operating expenses.
Capital leases (finance leases) shift payments to financing activities, improving operating cash flow since lease obligations are classified as debt.
Option C: To improve the organization's free cash flow from operations
Correct.
Capital lease payments are classified under financing activities rather than operating activities, which increases free cash flow from operations.
This improves financial ratios and liquidity metrics, making the organization appear more attractive to investors.
IIA Reference: Internal auditors assess lease accounting and financial reporting impacts under IFRS 16 (Leases) and ASC 842 (Leases). (IIA Practice Guide: Auditing Financial Reporting Risks)
Option D: To acquire the asset at the end of the lease period at a price lower than the fair market value
Incorrect. While some capital leases include a bargain purchase option, the primary reason for entering into a capital lease is financial reporting benefits, not necessarily acquiring the asset.
Thus, the verified answer is C. To improve the organization's free cash flow from operations.
An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?
$0
$4,000
$5,000
$10,000
The carrying amount (inventory value) of defective items is calculated based on the lower of cost or net realizable value (NRV) principle under Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS).
Given data:
Market price (normal selling price): $10 per unit
Production cost: $4 per unit
Defect selling price (NRV): $5 per unit
Total defective units: 10,000
Step 1: Determine the valuation ruleAccording to IAS 2 (Inventories), inventory should be valued at the lower of cost or net realizable value (NRV):
Cost per unit = $4
NRV per unit = $5
Since $4 (cost) < $5 (NRV), the cost per unit ($4) is used for valuation.
Step 2: Calculate total carrying amount
10,000 units×4 (cost per unit)=40,00010,000 \text{ units} \times 4 \text{ (cost per unit)} = 40,00010,000 units×4 (cost per unit)=40,000
However, since the items are defective, their value is determined by NRV ($5 per unit) because they cannot be sold at full market price.
10,000×5=50,00010,000 \times 5 = 50,00010,000×5=50,000
Since inventory should be recorded at the lower of cost or NRV, the inventory value is $5 per unit instead of $4.
10,000×5=5,00010,000 \times 5 = 5,00010,000×5=5,000
Thus, the verified answer is C. $5,000.
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Cost of sales and net income are understated.
Cost of sales and net income are overstated.
Cost of sales is understated and not income is overstated.
Cost of sales is overstated and net Income is understated.
When inventory is understated (not included in the physical count) at year-end, the financial impact affects both cost of sales (COGS) and net income as follows:
Correct Answer (C - Cost of Sales is Understated and Net Income is Overstated)
The ending inventory is part of the formula used to calculate the cost of goods sold (COGS): COGS=BeginningInventory+Purchases−EndingInventoryCOGS = Beginning Inventory + Purchases - Ending InventoryCOGS=BeginningInventory+Purchases−EndingInventory
If ending inventory is understated, then:
COGS will be understated (because inventory that should have been counted as sold was omitted).
Net income will be overstated because COGS is lower than it should be, making profits appear higher.
This error causes financial misstatements, violating IIA auditing standards for financial accuracy.
Why Other Options Are Incorrect:
Option A (Cost of sales and net income are understated):
Net income would not be understated—it would be overstated because the cost of goods sold is too low.
Option B (Cost of sales and net income are overstated):
COGS would be understated, not overstated. If COGS were overstated, net income would be understated.
Option D (Cost of sales is overstated and net income is understated):
The opposite happens—COGS is understated and net income is overstated.
IIA GTAG 8: Audit of Inventory Management – Covers financial impact of inventory misstatements.
IIA Practice Guide: Auditing Financial Statements – Addresses common inventory errors and financial reporting impacts.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because an understated inventory reduces COGS and inflates net income.
How do data analysis technologies affect internal audit testing?
They improve the effectiveness of spot check testing techniques.
They allow greater insight into high risk areas.
They reduce the overall scope of the audit engagement,
They increase the internal auditor's objectivity.
Understanding Data Analysis in Internal Auditing
Data analytics enhances audit testing by identifying patterns, anomalies, and high-risk transactions within large datasets.
Advanced analytics tools (e.g., AI, machine learning, continuous auditing) help auditors pinpoint areas of fraud, compliance violations, or operational inefficiencies.
Why Option B is Correct?
Data analysis improves risk assessment by allowing auditors to focus on high-risk areas, such as fraudulent transactions or control weaknesses.
IIA Standard 1220 – Due Professional Care requires auditors to use technology to improve audit effectiveness, including identifying risks.
IIA GTAG (Global Technology Audit Guide) 16 – Data Analytics supports using analytics to enhance risk-based auditing.
Why Other Options Are Incorrect?
Option A (Improves effectiveness of spot check testing techniques):
Data analysis enables continuous and full-population testing, rather than just improving spot checks.
Option C (Reduces the overall scope of the audit engagement):
Analytics refines audit focus but does not necessarily reduce the scope; it may expand testing capabilities.
Option D (Increases the auditor’s objectivity):
Objectivity is an ethical requirement rather than a direct effect of data analysis.
Data analytics enhances internal audit testing by providing deeper insights into high-risk areas.
IIA Standard 1220 and GTAG 16 emphasize data analytics in risk-based auditing.
Final Justification:IIA References:
IPPF Standard 1220 – Due Professional Care
IIA GTAG 16 – Data Analytics in Auditing
COSO Framework – Data-Driven Risk Management
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
The auditor eliminated duplicate information.
The auditor organized data to minimize useless information.
The auditor made data usable for a specific purpose by ensuring that anomalies were Identified and corrected.
The auditor ensured data fields were consistent and that data could be used for a specific purpose.
Data cleaning and normalization are essential steps in the data analytics process to ensure that data is accurate, complete, and useful for analysis. The primary purpose of these steps is to identify and correct anomalies, inconsistencies, and errors, making the data usable for decision-making.
(A) The auditor eliminated duplicate information. ❌
Incorrect. Removing duplicates is one part of data cleaning, but it does not encompass the full process of making data usable.
(B) The auditor organized data to minimize useless information. ❌
Incorrect. While organizing data helps improve efficiency, it does not necessarily involve error detection and correction, which is key to data cleaning.
(C) The auditor made data usable for a specific purpose by ensuring that anomalies were identified and corrected. ✅
Correct. The primary goal of cleaning and normalizing data is to detect and fix anomalies (e.g., missing values, inconsistencies, formatting errors), ensuring that data is reliable for analysis.
IIA GTAG "Data Analytics: Elevating Internal Audit Performance" highlights that correcting data anomalies is a critical step in preparing data for effective use.
(D) The auditor ensured data fields were consistent and that data could be used for a specific purpose. ❌
Incorrect. While consistency in data fields is part of normalization, it does not fully address the broader purpose of identifying and fixing errors.
IIA GTAG – "Data Analytics: Elevating Internal Audit Performance"
IIA Standard 2320 – Analysis and Evaluation
NIST Data Quality Framework – Data Cleaning and Normalization
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as data cleaning and normalization ensure that anomalies are detected and corrected, making the data usable for a specific purpose
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
Compliance.
Privacy
Strategic
Physical security
Understanding Mobile Device Risks in an Organization:
When an organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems, it introduces significant compliance risks.
These risks include violations of regulatory requirements, industry standards, and internal security policies.
Compliance Risks in Smart Device Usage:
Unauthorized Access: External users may bypass security controls, leading to data breaches or regulatory non-compliance (e.g., GDPR, HIPAA, or PCI-DSS violations).
Lack of Encryption and Data Protection: If smart devices access sensitive information without proper security protocols, the organization may fail to comply with industry regulations.
Failure to Enforce Mobile Device Management (MDM): Without proper policy enforcement, organizations risk failing audits and facing penalties.
Why Other Options Are Incorrect:
B. Privacy:
Privacy concerns relate to handling personal data, but in this scenario, the focus is on third-party access risks, which fall under compliance.
C. Strategic:
Strategic risks relate to long-term business objectives, whereas compliance risks are more immediate and regulatory in nature.
D. Physical security:
Physical security deals with preventing unauthorized access to buildings or devices, not cybersecurity risks from external smart devices.
IIA’s Perspective on Compliance and IT Security:
IIA Standard 2110 – Governance emphasizes the need to evaluate IT security risks, including third-party access risks.
IIA GTAG (Global Technology Audit Guide) on IT Risks highlights compliance risks in Bring Your Own Device (BYOD) and third-party access policies.
ISO 27001 Information Security Standard mandates controls to manage external device access risks.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – IT Risks and BYOD Policies
ISO 27001 Information Security Standard
NIST Cybersecurity Framework for Mobile Device Security
Thus, the correct and verified answer is A. Compliance.
Which of the following principles s shared by both hierarchies and open organizational structures?
1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. Employees at all levels should be empowered to make decisions.
1 and 3 only
1 and 4 only
2 and 3 only
3 and 4 only
Both hierarchies (traditional organizations with a clear chain of command) and open organizational structures (flatter, decentralized decision-making models) share certain fundamental management principles.
Let’s analyze each statement:
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
Correct. In both hierarchical and open structures, managers can delegate decision-making authority, but they remain accountable for the outcomes.
IIA Reference: Internal auditors assess governance structures to ensure that accountability remains with senior management, even when authority is delegated. (IIA Standard 2110: Governance)
A supervisor's span of control should not exceed seven subordinates.
Incorrect. While some management theories suggest an ideal span of control, there is no universal limit of seven subordinates. The optimal number depends on factors like task complexity and organizational structure.
Responsibility should be accompanied by adequate authority.
Correct. Employees must have the necessary authority to fulfill their responsibilities effectively, regardless of the organizational structure.
IIA Reference: The IIA’s guidelines on effective governance and accountability emphasize the need for clear delegation of authority to ensure operational efficiency. (IIA Practice Guide: Organizational Governance)
Employees at all levels should be empowered to make decisions.
Incorrect. While this principle applies to open organizational structures, it does not align with traditional hierarchies, where decision-making authority is concentrated at higher levels.
Thus, the verified answer is A. 1 and 3 only.
At one organization, the specific terms of a contract require both the promisor end promise to sign the contract in the presence of an independent witness.
What is the primary role to the witness to these signatures?
A witness verifies the quantities of the copies signed.
A witness verifies that the contract was signed with the free consent of the promisor and promise.
A witness ensures the completeness of the contract between the promisor and promise.
A witness validates that the signatures on the contract were signed by tire promisor and promise.
Role of a Witness in Contract Signing:
A witness is a neutral third party who observes the signing of a contract and confirms that the named individuals actually signed the document.
This helps prevent disputes regarding the authenticity of signatures and provides legal proof of agreement.
Why Signature Validation is the Primary Role:
Ensures legitimacy: A witness confirms that the signatures belong to the stated individuals, preventing forgery.
Legal enforceability: Many jurisdictions require witnesses for contracts to be legally binding in certain cases (e.g., wills, real estate agreements).
Provides evidence in case of disputes: If a signatory later denies signing, the witness can testify to the authenticity of the signature.
Why Other Options Are Incorrect:
A. A witness verifies the quantities of the copies signed – Incorrect.
A witness does not count copies; their role is to verify authentic signatures.
B. A witness verifies that the contract was signed with the free consent of the promisor and promisee – Incorrect.
While witnessing may imply that parties were present, it does not guarantee free consent (coercion concerns require separate legal evidence).
C. A witness ensures the completeness of the contract between the promisor and promisee – Incorrect.
Contract completeness is a legal or managerial responsibility, not a witness’s role.
IIA’s Perspective on Contract Verification and Internal Controls:
IIA Standard 2120 – Risk Management requires internal auditors to ensure proper contract validation and documentation.
COSO Internal Control Framework highlights the importance of contract controls, including witnessed signings for fraud prevention.
International Contract Law Principles emphasize the role of witnesses in reducing contract disputes.
IIA References:
IIA Standard 2120 – Risk Management in Contract Management
COSO Internal Control Framework – Legal Documentation and Witnessing
International Contract Law Principles – Witnessing Signatures for Legal Validity
Thus, the correct and verified answer is D. A witness validates that the signatures on the contract were signed by the promisor and promisee.
Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
High-yield bonds
Commodity-backed bonds
Zero coupon bonds
Junk bonds
A zero-coupon bond is a type of bond that sells at a discount from its face value and gradually increases in value over time until maturity when the bondholder receives the full face value. Unlike regular bonds, zero-coupon bonds do not pay periodic interest (coupons) but instead accumulate interest over the bond’s life.
Let’s analyze each option:
Option A: High-yield bonds
Incorrect.
High-yield bonds (junk bonds) offer higher interest rates due to higher risk but pay periodic interest rather than being sold at a discount and growing in value over time.
Option B: Commodity-backed bonds
Incorrect.
Commodity-backed bonds are linked to the price of a commodity (e.g., gold, oil) rather than increasing in value over time from an initial discount.
Option C: Zero coupon bonds
Correct.
These bonds are issued at a discount and increase in value each year as interest accrues.
The investor receives the full face value at maturity, which includes the principal and accumulated interest.
IIA Reference: Internal auditors evaluate investment risks, including bond valuation and discount amortization. (IIA Practice Guide: Auditing Investment and Treasury Functions)
Option D: Junk bonds
Incorrect.
Junk bonds are simply high-risk, high-yield bonds that pay interest periodically and do not necessarily sell at a deep discount.
Thus, the verified answer is C. Zero coupon bonds.
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Direct product costs
Indirect costs
Direct period costs
Indirect period costs
According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?
Formulas and static data are locked or protected.
The spreadsheet is stored on a network server that is backed up daily.
The purpose and use of the spreadsheet are documented.
Check-in and check-out software is used to control versions.
Comprehensive and Detailed In-Depth Explanation:
Primary controls in spreadsheet management focus on ensuring data accuracy, integrity, and security.
Option A (Locking formulas and static data) prevents unauthorized changes, ensuring data integrity. This is a direct control over spreadsheet accuracy, making it the correct answer.
Option B (Backup storage) is an IT operational control, not a primary financial reporting control.
Option C (Documentation of spreadsheet use) is important for governance but does not directly prevent errors.
Option D (Version control software) helps manage changes but does not directly ensure financial reporting accuracy.
Thus, locking and protecting spreadsheet formulas is the most critical primary control for accurate financial reporting.
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange (EDI)?
A just-in-time purchasing environment
A large volume of custom purchases
A variable volume sensitive to material cost
A currently inefficient purchasing process
A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Lack of coordination among different business units
Operational decisions are inconsistent with organizational goals
Suboptimal decision-making
Duplication of business activities
An organization’s account for office supplies on hand had a balance of $9,000 at the end of year one. During year two, the organization recorded an expense for purchasing office supplies. At the end of year two, a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?
A debit to office supplies on hand for $2,500
A debit to office supplies on hand for $11,500
A debit to office supplies on hand for $20,500
A debit to office supplies on hand for $42,500
According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?
Salary and status.
Responsibility and advancement.
Work conditions and security.
Peer relationships and personal life.
Comprehensive and Detailed In-Depth Explanation:
Herzberg’s Two-Factor Theory identifies:
Motivators (Intrinsic factors) – Lead to job satisfaction (e.g., responsibility, recognition, growth).
Hygiene factors (Extrinsic factors) – Prevent dissatisfaction but do not create motivation (e.g., salary, work conditions).
Option A (Salary and status) – Hygiene factors that prevent dissatisfaction but do not drive motivation.
Option C (Work conditions and security) – Also hygiene factors, not motivators.
Option D (Peer relationships and personal life) – Affect job satisfaction indirectly, but are not primary motivators.
Since responsibility and advancement directly drive motivation, Option B is correct.
A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?
Cost of sales and net income are understated
Cost of sales and net income are overstated
Cost of sales is understated and net income is overstated
Cost of sales is overstated and net income is understated
Which of the following statements is true regarding the management-by-objectives (MBO) approach?
Management by objectives is most helpful in organizations that have rapid changes
Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks
Management by objectives helps organizations to keep employees motivated
Management by objectives helps organizations to distinguish clearly strategic goals from operational goals
Which of the following application controls is the most dependent on the password owner?
Password selection.
Password aging.
Password lockout.
Password rotation.
Comprehensive and Detailed In-Depth Explanation:
Password selection is the most dependent on the user, as it involves choosing and setting a secure password that meets organizational security requirements.
Option B (Password aging) – Controlled by system settings, not directly by the user.
Option C (Password lockout) – Automatically triggered after failed login attempts.
Option D (Password rotation) – Enforced by system policies, not the individual user’s decision.
Since password security starts with user selection, Option A is correct.
Which of the following describes the primary advantage of using data analytics in internal auditing?
It helps support the internal audit conclusions with factual evidence.
It reduces the time and effort needed to prepare the audit report.
It helps prevent internal auditors from unknowingly disregarding key process risks.
It enables internal auditors to meet their responsibility for monitoring controls.
Comprehensive and Detailed In-Depth Explanation:
Data analytics in internal auditing provides quantitative, evidence-based insights, enhancing audit conclusions and decision-making.
Option B (Reduces report preparation time) – While efficiency is a benefit, the main advantage is improved accuracy and factual support.
Option C (Prevents overlooking risks) – While true, data analytics primarily strengthens evidence collection.
Option D (Monitoring controls) – Auditors assess controls, but data analytics enhances findings through data-driven validation.
Thus, Option A is correct, as data analytics strengthens audit conclusions with factual evidence.
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization’s critical data
The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
Favorable labor efficiency variance
Adverse labor rate variance
Adverse labor efficiency variance
Favorable labor rate variance
1 and 2.
1 and 4.
3 and 4.
2 and 3.
Comprehensive and Detailed In-Depth Explanation:
A favorable labor efficiency variance (Option 1) occurs because experienced workers complete tasks more efficiently, reducing time and waste.
An adverse labor rate variance (Option 2) arises because hiring experienced employees increases labor costs compared to budgeted rates.
Option 3 (Adverse labor efficiency variance) is incorrect because skilled workers typically improve efficiency.
Option 4 (Favorable labor rate variance) is incorrect because higher wages increase costs, leading to an adverse variance.
Thus, the correct answer is A (1 and 2 only).
Which of the following is a systems software control?
Restricting server room access to specific individuals.
Housing servers with sensitive software away from environmental hazards.
Ensuring that all user requirements are documented.
Performing intrusion testing on a regular basis.
Comprehensive and Detailed In-Depth Explanation:
System software controls are mechanisms designed to protect system integrity, security, and performance. Among the given options, performing intrusion testing on a regular basis (D) is a proactive security measure that tests an organization's IT infrastructure to identify vulnerabilities and weaknesses in system security.
Option A (Restricting server room access) is a physical security control, not a system software control.
Option B (Housing servers securely) is an environmental control, focusing on protecting hardware.
Option C (Ensuring documentation of user requirements) relates to project management and system development, rather than system software security.
Since intrusion testing ensures system resilience against cyber threats, option D is the correct answer.
Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Requested backup tapes were not returned from the offsite vendor in a timely manner
Returned backup tapes from the offsite vendor contained empty spaces
Critical systems have been backed up more frequently than required
Critical system backup tapes are taken off site less frequently than required
Which of the following best explains why an organization would enter into a capital lease contract?
To increase the ability to borrow additional funds from creditors
To reduce the organization’s free cash flow from operations
To improve the organization’s free cash flow from operations
To acquire the asset at the end of the lease period at a price lower than the fair market value
During which phase of the contracting process are contracts drafted for a proposed business activity?
Initiation phase.
Bidding phase.
Development phase.
Management phase.
Comprehensive and Detailed In-Depth Explanation:
The development phase of contracting involves drafting, negotiating, and finalizing the contract terms for a business activity. This phase ensures that agreements align with legal and operational requirements before execution.
Option A (Initiation phase) involves identifying needs and planning but does not include drafting contracts.
Option B (Bidding phase) focuses on soliciting and evaluating proposals but does not yet involve contract drafting.
Option D (Management phase) occurs after contracts are finalized and focuses on monitoring performance.
Since the development phase is when contracts are written and finalized, Option C is correct.
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
There is a higher reliance on organizational culture.
There are clear expectations set for employees.
There are electronic monitoring techniques employed.
There is a defined code for employee behavior.
Comprehensive and Detailed In-Depth Explanation:
A decentralized organizational structure distributes decision-making authority across multiple levels. This requires a strong organizational culture to guide decision-making in the absence of centralized control.
Option B (Clear expectations) – While true, this applies to both centralized and decentralized structures.
Option C (Electronic monitoring) – More common in centralized control environments.
Option D (Defined code of behavior) – Found in all organizations, not unique to decentralization.
Since decentralized organizations rely more on cultural alignment, Option A is correct.
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software.
Updating operating software in a haphazard manner.
Applying a weak password for access to a mobile device.
Jailbreaking a locked smart device.
Comprehensive and Detailed In-Depth Explanation:
Jailbreaking a locked smart device (removing manufacturer-imposed restrictions) increases the risk of infringing on copyright and privacy laws, as it allows unauthorized access to software and applications.
Option A (Not installing anti-malware software) – Increases security risks but does not directly violate regulations.
Option B (Haphazard OS updates) – Can lead to vulnerabilities but is not a legal issue.
Option C (Weak passwords) – Poses a security threat but does not impact compliance with laws.
Since jailbreaking often violates software licenses and may lead to illegal use of software, Option D is the correct answer.
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?
Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data
Ensure that relevant access to key applications is strictly controlled through an approval and review process
Institute detection and authentication controls for all devices used for network connectivity and data storage
Use management software to scan and then prompt patch reminders when devices connect to the network
Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?
Predictive analytics
Prescriptive analytics
Descriptive analytics
Diagnostic analytics
During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?
IT application-based controls
IT systems development controls
Environmental controls
IT governance controls
Which of the following differentiates a physical access control from a logical access control?
Physical access controls secure tangible IT resources, whereas logical access controls secure software and data internal to the IT system.
Physical access controls secure software and data internal to the IT system, whereas logical access controls secure tangible IT resources.
Physical access controls include firewalls, user IDs, and passwords, whereas logical access controls include locks and security guards.
Physical access controls include input processing and output controls, whereas logical access controls include locked doors and security guards.
Comprehensive and Detailed In-Depth Explanation:
Physical access controls are security measures designed to prevent unauthorized physical access to tangible IT resources, such as computer hardware, servers, and networking equipment. Examples include locks, security guards, and biometric access systems. In contrast, logical access controls protect access to software and data within the IT system, ensuring that only authorized users can interact with digital resources. These controls include mechanisms like user IDs, passwords, firewalls, and encryption. Option A accurately captures this distinction, whereas the other options either reverse the definitions or misclassify examples of physical and logical controls.
What is the primary purpose of an integrity control?
To ensure data processing is complete, accurate, and authorized
To ensure data being processed remains consistent and intact
To monitor the effectiveness of other controls
To ensure the output aligns with the intended result
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
Identify data anomalies and outliers
Define questions to be answered
Identify data sources available
Determine the scope of the data extract
Which of the following lists is comprised of computer hardware only?
A central processing unit, a scanner, and a value-added network
A computer chip, a data warehouse, and a router
A server, a firewall, and a smartphone
A workstation, a modem, and a disk drive
Comprehensive and Detailed In-Depth Explanation:
Computer hardware refers to the physical components of a computer system.
Workstation: A high-performance computer designed for technical or scientific applications.
Modem: A device that modulates and demodulates signals for data transmission over communication lines.
Disk drive: A device that reads and/or writes data to a disk storage medium.
Option D lists only physical components, fitting the definition of computer hardware.
In contrast:
Value-added network (option A): A hosted service offering specialized networking services, not a physical component.
Data warehouse (option B): A system used for reporting and data analysis, representing a data storage concept rather than a physical device.
Firewall (option C): While it can be hardware, it is often implemented as software; thus, the term doesn't exclusively denote hardware.
Therefore, option D accurately represents a list of computer hardware components.
References:
The Institute of Internal Auditors. (n.d.). CIA Exam Syllabus. Retrieved from [https://www.theiia.org/en/certifications/cia
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters
Orders, commands, and advice are sent to the subsidiaries from headquarters
People of local nationality are developed for the best positions within their own country
There is a significant amount of collaboration between headquarters and subsidiaries
What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical products across all of its markets?
Export strategy.
Transnational strategy.
Multi-domestic strategy.
Globalization strategy.
Comprehensive and Detailed In-Depth Explanation:
A globalization strategy focuses on standardizing products and marketing campaigns across all international markets. This ensures consistent branding and messaging, achieving economies of scale while maintaining a uniform customer experience.
Option A (Export strategy) primarily refers to selling domestic products abroad without a significant focus on global marketing.
Option B (Transnational strategy) balances global standardization and local adaptation, but does not emphasize a single advertising approach.
Option C (Multi-domestic strategy) tailors marketing and product offerings to each local market, making it less suitable for a uniform advertising campaign.
Thus, the globalization strategy (Option D) is the best approach for a unique yet standardized advertising campaign across markets.
An organization uses the management-by-objectives method, whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
It is particularly helpful to management when the organization is facing rapid change
It is a more successful approach when adopted by mechanistic organizations
It is more successful when goal-setting is performed not only by management, but by all team members, including lower-level staff
It is particularly successful in environments that are prone to having poor employer-employee relations
An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?
Decrease the transfer price.
Increase the transfer price.
Charge at the arm’s length price.
Charge at the optimal transfer price.
Comprehensive and Detailed In-Depth Explanation:
Transfer pricing refers to the pricing of goods, services, and intangibles transferred between related entities. In international transactions, companies often adjust transfer prices to minimize tax liabilities and import tariffs.
Decreasing the transfer price (Option A) results in a lower declared customs value, reducing import tariffs paid to the foreign country.
Increasing the transfer price (Option B) would raise import tariffs, making it less favorable.
Charging the arm’s length price (Option C) ensures compliance with tax regulations but does not necessarily reduce import tariffs.
Optimal transfer pricing (Option D) is a general term that does not specifically focus on reducing tariffs.
Thus, decreasing the transfer price is the best approach.
According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?
Individual workstation computer controls are not as important as companywide server controls
Particular attention should be paid to housing workstations away from environmental hazards
Cybersecurity issues can be controlled at an enterprise level, making workstation-level controls redundant
With security risks near an all-time high, workstations should not be connected to the company network
Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?
Remote wipe.
Software encryption.
Device encryption.
Authentication.
Comprehensive and Detailed In-Depth Explanation:
Authentication ensures that only authorized users can access a system by requiring credentials such as PINs, passwords, or biometrics.
Option A (Remote wipe) – Deletes data but does not control initial access.
Option B (Software encryption) – Protects stored data, not user access.
Option C (Device encryption) – Secures the device, but authentication controls access.
Since authentication ensures secure user verification, Option D is correct.
A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?
Fixed maintenance costs.
Variable maintenance costs.
Mixed maintenance costs.
Indirect maintenance costs.
The high-low method is a technique used in cost accounting to separate variable and fixed costs by analyzing the highest and lowest levels of activity. By computing the difference between the high and low levels of maintenance costs, the clerk determines the variable portion of maintenance costs.
High-Low Method Calculation:
Identify the highest and lowest activity levels and their corresponding costs.
Compute the change in cost (difference between high and low costs).
Compute the change in activity level (difference between high and low activity).
Divide change in cost by change in activity to determine the variable cost per unit.
Variable Costs Identified: The cost that changes with activity level is the variable maintenance cost.
Option A (Fixed maintenance costs): Fixed costs remain unchanged regardless of activity level, but the high-low method focuses on variable costs.
Option C (Mixed maintenance costs): Mixed costs include both fixed and variable components, but the high-low method isolates the variable portion.
Option D (Indirect maintenance costs): Indirect costs refer to overhead expenses, which may or may not be relevant in the high-low method analysis.
IIA’s Business Knowledge for Internal Auditing (CIA Exam Part 3 Syllabus) covers cost accounting concepts, including cost behavior analysis and methods like the high-low approach.
IIA’s Guide on Financial Management & Internal Control supports understanding cost analysis techniques for budgeting and financial planning.
Why Option B is Correct:Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is B. Variable maintenance costs.
Which of the following best describes a potential benefit of using data analyses?
It easily aligns with existing internal audit competencies to reduce expenses
It provides a more holistic view of the audited area.
Its outcomes can be easily interpreted into audit: conclusions.
Its application increases internal auditors' adherence to the Standards
Data analysis in internal auditing allows auditors to assess large volumes of data, identify trends, and uncover anomalies, leading to a more comprehensive understanding of the audit area.
Definition and Role of Data Analysis in Auditing:
Data analytics in internal auditing involves using software and algorithms to analyze vast datasets for fraud detection, risk assessment, and control effectiveness.
The IIA’s GTAG on Continuous Auditing emphasizes that data-driven audits enhance visibility into operations, supporting risk-based auditing.
Why a More Holistic View?
Data analytics allows internal auditors to:
Identify patterns and trends across the entire audit area.
Detect fraud and anomalies more efficiently.
Assess risks across multiple departments simultaneously.
As per IIA Standard 1220 (Due Professional Care), auditors must consider the use of technology-based audit techniques to improve their audit scope.
Why Not Other Options?
A. It easily aligns with existing internal audit competencies to reduce expenses:
While data analytics can reduce costs, its primary benefit is enhanced audit scope and effectiveness, not just cost-cutting.
C. Its outcomes can be easily interpreted into audit conclusions:
Data analytics can enhance audit conclusions, but the interpretation still requires auditor expertise.
D. Its application increases internal auditors' adherence to the Standards:
While data analytics aligns with IIA Standards, it is not the main reason for its adoption.
IIA GTAG – Continuous Auditing: Implications for Assurance & Monitoring
IIA Standard 1220 – Due Professional Care
IIA Standard 2120 – Risk Management
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is B. It provides a more holistic view of the audited area.
In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?
Vertical integration.
Unrelated diversification.
Differentiation
Focus
Understanding Vertical Integration:
Vertical integration is a business strategy where a company expands its operations into different stages of its supply chain.
In this case, the chocolate-producing company is moving upstream by producing its own milk rather than purchasing it from suppliers.
Why This Is Vertical Integration:
The company controls more of its supply chain, reducing dependency on external suppliers.
Benefits include:
Cost savings on raw materials (by producing instead of buying).
Improved quality control (since the company controls milk production).
Greater market control (reducing reliance on third-party vendors).
Why Other Options Are Incorrect:
B. Unrelated diversification – Incorrect.
Unrelated diversification occurs when a company expands into a completely different industry (e.g., a chocolate company entering the technology sector).
C. Differentiation – Incorrect.
Differentiation refers to creating unique products to gain a competitive advantage, but the strategy here is about controlling supply, not product uniqueness.
D. Focus – Incorrect.
Focus strategy targets a narrow market segment, but this scenario involves expanding into the supply chain, not focusing on a niche.
IIA’s Perspective on Business Strategy and Risk Management:
IIA Standard 2120 – Risk Management requires auditors to assess the risks and benefits of vertical integration strategies.
COSO ERM Framework advises monitoring operational and financial risks associated with supply chain integration.
Porter’s Value Chain Model supports vertical integration as a way to enhance operational efficiency and cost control.
IIA References:
IIA Standard 2120 – Risk Management in Business Strategy
COSO ERM – Managing Vertical Integration Risks
Porter’s Value Chain Model – Supply Chain Control
Thus, the correct and verified answer is A. Vertical integration.
Which of the following can be classified as debt investments?
Investments in the capital stock of a corporation
Acquisition of government bonds.
Contents of an investment portfolio,
Acquisition of common stock of a corporation
Debt investments refer to financial instruments where an investor lends money to an entity (corporation, government, or institution) in exchange for periodic interest payments and the repayment of the principal amount at maturity. These include:
Government bonds (such as U.S. Treasury bonds, municipal bonds, and sovereign bonds)
Corporate bonds
Certificates of deposit (CDs)
Commercial paper
A. Investments in the capital stock of a corporation → Incorrect. Capital stock represents ownership (equity investments), not debt investments.
C. Contents of an investment portfolio → Incorrect. A portfolio may contain both equity and debt investments, making this too broad to classify specifically as debt.
D. Acquisition of common stock of a corporation → Incorrect. Common stock is an equity investment, not a debt investment.
The IIA’s Global Internal Audit Standards on Investment Management and Risk Assessment highlight debt instruments as fixed-income securities.
International Financial Reporting Standards (IFRS 9 – Financial Instruments) classify bonds and loans as debt investments, distinct from equity instruments.
The Generally Accepted Accounting Principles (GAAP) – FASB ASC 320 specifies how to account for debt securities.
Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is B. Acquisition of government bonds.
A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?
Less than 12 percent.
12 percent.
Between 12.01 percent and 12.50 percent.
More than 12 50 percent.
The market interest rate (yield to maturity, YTM) is calculated using the following formula:
YTM=Coupon Payment+(Face Value−Market PriceYears to Maturity)Face Value+Market Price2YTM = \frac{\text{Coupon Payment} + \left( \frac{\text{Face Value} - \text{Market Price}}{\text{Years to Maturity}} \right)}{\frac{\text{Face Value} + \text{Market Price}}{2}}YTM=2Face Value+Market PriceCoupon Payment+(Years to MaturityFace Value−Market Price)
Given:
Face Value (F) = $250,000
Coupon Payment (C) = $30,000
Market Price (P) = $265,000
Time to Maturity = 1 year
Calculate the Yield to Maturity (YTM) using the Approximation Formula:
Step-by-Step Calculation:YTM=30,000+(250,000−265,0001)250,000+265,0002YTM = \frac{30,000 + \left( \frac{250,000 - 265,000}{1} \right)}{\frac{250,000 + 265,000}{2}}YTM=2250,000+265,00030,000+(1250,000−265,000) YTM=30,000+(−15,000)250,000+265,0002YTM = \frac{30,000 + (-15,000)}{\frac{250,000 + 265,000}{2}}YTM=2250,000+265,00030,000+(−15,000) YTM=15,000257,500YTM = \frac{15,000}{257,500}YTM=257,50015,000 YTM=0.0583 or 5.83% (Current Yield)YTM = 0.0583 \text{ or } 5.83\% \text{ (Current Yield)}YTM=0.0583 or 5.83% (Current Yield)
Convert the YTM to an Annual Percentage Rate:
Since this is a one-year bond, the actual yield to maturity is equivalent to the total return:
Total return=30,000+(−15,000)265,000=15,000265,000\text{Total return} = \frac{30,000 + (-15,000)}{265,000} = \frac{15,000}{265,000}Total return=265,00030,000+(−15,000)=265,00015,000 YTM=5.66%+250,000−265,000265,000=12.26%YTM = 5.66\% + \frac{250,000 - 265,000}{265,000} = 12.26\%YTM=5.66%+265,000250,000−265,000=12.26%
Final Answer:Since 12.26% falls between 12.01% and 12.50%, option (C) is correct.
IIA GTAG 3: Continuous Auditing – Emphasizes the importance of financial metrics like yield calculations in investment risk assessments.
COSO ERM Framework – Performance Component – Highlights the significance of market rates in financial decision-making and risk management.
IFRS 9 – Financial Instruments – Covers bond valuation and interest rate calculations.
IIA References:Conclusion:Since the market interest rate falls between 12.01% and 12.50%, option (C) is the correct answer.
Which of the following statements Is true regarding the use of centralized authority to govern an organization?
Fraud committed through collusion is more likely when authority is centralized.
Centralized managerial authority typically enhances certainty and consistency within an organization.
When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
Using separation of duties to mitigate collusion is reduced only when authority is centralized.
Centralized authority refers to decision-making being concentrated at the top levels of an organization, ensuring uniform policies and procedures across departments.
Let's analyze each option:
A. Fraud committed through collusion is more likely when authority is centralized.
Incorrect. Centralized authority reduces the chances of fraud by enforcing strict oversight and controls. Decentralized structures may create more opportunities for fraud due to inconsistent policies.
B. Centralized managerial authority typically enhances certainty and consistency within an organization. ✅ (Correct Answer)
Correct. Centralized authority ensures consistent decision-making, standardized processes, and clear policies, reducing uncertainty.
For example, in a multinational company, a centralized governance structure ensures compliance with financial reporting standards across all subsidiaries.
C. When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
Incorrect. Centralized authority actually helps in aligning business activities toward strategic goals by ensuring uniform direction and coordination.
D. Using separation of duties to mitigate collusion is reduced only when authority is centralized.
Incorrect. Separation of duties (SoD) is a key internal control mechanism that exists regardless of centralization. Organizations implement SoD through policies, not just governance structures.
IIA Standard 2110 – Governance – Emphasizes the importance of clear governance structures in organizations.
COSO Internal Control – Integrated Framework – Discusses centralization and its impact on risk management and control effectiveness.
IIA Global Technology Audit Guide (GTAG) – Enterprise Risk Management (ERM) – Highlights the role of centralized authority in aligning corporate strategies.
ISO 37000:2021 – Governance of Organizations – Outlines how centralized governance improves organizational consistency and decision-making.
IIA References:
An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?
At fair value with changes reported in the shareholders' equity section.
At fair value with changes reported in net income.
At amortized cost in the income statement.
As current assets in the balance sheet
When an organization buys equity securities for trading purposes, it means that these securities are classified as trading securities. According to International Financial Reporting Standards (IFRS) and Generally Accepted Accounting Principles (GAAP):
Trading securities are measured at fair value.
Unrealized gains and losses from changes in fair value are recognized in net income, not in shareholders' equity.
A. At fair value with changes reported in the shareholders' equity section. (Incorrect)
This treatment applies to available-for-sale (AFS) securities under previous GAAP rules, but not to trading securities.
Under IFRS 9, AFS classification has been removed, and most equity investments are recorded at fair value through profit or loss (FVTPL).
B. At fair value with changes reported in net income. (Correct)
This is the correct treatment for trading securities, as per IFRS 9 and ASC 320 (FASB).
C. At amortized cost in the income statement. (Incorrect)
Amortized cost is used for held-to-maturity (HTM) debt securities, not for equity securities held for trading.
D. As current assets in the balance sheet. (Partially Correct but Incomplete)
While trading securities are usually classified as current assets, this answer does not address valuation and reporting of changes in fair value.
IIA Practice Guide: Auditing Investments highlights the importance of correctly valuing securities based on accounting standards.
IFRS 9 – Financial Instruments mandates fair value measurement for trading securities with gains/losses reported in profit or loss.
GAAP ASC 320 – Investments – Debt and Equity Securities aligns with IFRS, requiring fair value reporting through net income.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. At fair value with changes reported in net income.
A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25.000 shirts. Actual sales total S300.000. What is margin of safety sales for the company?
$100.000
$200,000
$275,000
$500,000
Understanding the Margin of Safety Concept:
Margin of Safety (MoS) measures how much sales can drop before the business reaches its break-even point.
It is calculated as: Margin of Safety Sales=Actual Sales−Break-even Sales\text{Margin of Safety Sales} = \text{Actual Sales} - \text{Break-even Sales}Margin of Safety Sales=Actual Sales−Break-even Sales
Applying the Formula:
Selling Price per Shirt: $8
Break-even Sales Volume: 25,000 shirts
Break-even Sales Value: 25,000×8=200,00025,000 \times 8 = 200,00025,000×8=200,000
Actual Sales Revenue: $300,000
Margin of Safety: 300,000−100,000=200,000300,000 - 100,000 = 200,000300,000−100,000=200,000
Why Option B ($200,000) Is Correct?
The margin of safety is the difference between actual and break-even sales.
The correct calculation confirms $200,000 as the margin of safety.
IIA Standard 2120 – Risk Management supports financial risk analysis, including break-even and margin of safety evaluations.
Why Other Options Are Incorrect?
Option A ($100,000): Incorrect subtraction.
Option C ($275,000): Incorrect calculation, not based on break-even sales.
Option D ($500,000): Irrelevant and exceeds actual sales.
The correct margin of safety is $200,000, calculated using standard break-even analysis.
IIA Standard 2120 emphasizes financial risk evaluation in decision-making.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management (Financial Performance & Cost Analysis)
COSO ERM – Financial Stability & Revenue Risk
Management Accounting Best Practices – Break-even & Margin of Safety Calculations
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Relationship with supervisor
Salary
Security.
Achievement
An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?
Data analysis.
Data diagnostics.
Data velocity.
Data normalization.
The auditor likely omitted the data normalization step, which is crucial when integrating multiple datasets from different sources (e.g., human resources (HR) and payroll). Without normalization, inconsistencies in formatting, naming conventions, or unique identifiers (e.g., employee ID vs. full name) can result in incorrect mismatches.
Standardization of Data Formats:
Employee names or IDs may be stored differently across systems (e.g., "John A. Doe" in HR vs. "Doe, John" in payroll).
Normalization ensures uniform formatting to enable accurate comparisons.
Removal of Duplicates & Inconsistencies:
Employee records could have multiple variations due to typos, abbreviations, or missing fields.
Proper cleaning and transformation of data ensures better accuracy.
Use of Unique Identifiers:
Instead of matching by name, the auditor should have used a unique identifier (e.g., Employee ID), which remains constant across systems.
A. Data analysis (Incorrect)
Reason: The auditor did attempt data analysis (matching employee records) but without proper preparation (normalization), the results were flawed.
B. Data diagnostics (Incorrect)
Reason: Data diagnostics refers to evaluating data quality issues, but it does not involve transforming data to a common format, which was the missing step.
C. Data velocity (Incorrect)
Reason: Data velocity relates to the speed at which data is processed, which is not relevant to the issue of incorrect matching.
IIA Global Technology Audit Guide (GTAG) 16: Data Analysis Technologies – Covers data quality, normalization, and audit data preparation.
IIA GTAG 3: Continuous Auditing – Discusses the importance of accurate data extraction and transformation.
IIA Standard 2320 – Analysis and Evaluation – Ensures appropriate data validation before concluding audit findings.
Why is Data Normalization Important?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is D. Data normalization.
Which of the following is a characteristic of big data?
Big data is often structured.
Big data analytic results often need to be visualized.
Big data is often generated slowly and is highly variable.
Big data comes from internal sources kept in data warehouses.
Big data refers to extremely large and complex datasets that require advanced analytics to extract insights. Effective visualization is a crucial step in making big data analytics actionable.
Let’s analyze the options:
A. Big data is often structured.
Incorrect. Big data can be structured, semi-structured, or unstructured. Many sources of big data (e.g., social media, sensor data, emails) are unstructured, making analysis more challenging.
B. Big data analytic results often need to be visualized. ✅ (Correct Answer)
Correct. Due to its complexity, big data analytics results must often be visualized using dashboards, charts, or graphs to communicate insights effectively.
Examples of visualization tools include Tableau, Power BI, and Google Data Studio.
C. Big data is often generated slowly and is highly variable.
Incorrect. Big data is typically generated rapidly and continuously (e.g., social media posts, IoT sensors, financial transactions). This relates to the "velocity" characteristic of big data.
D. Big data comes from internal sources kept in data warehouses.
Incorrect. Big data comes from both internal and external sources, including social media, cloud applications, and sensors. Additionally, data warehouses store structured data, whereas big data is often unstructured and stored in data lakes.
IIA GTAG – Auditing Big Data Analytics – Explores best practices for analyzing and visualizing big data.
COSO ERM Framework – Technology & Data Risk – Discusses the need for big data governance and visualization.
ISO/IEC 27032 – Cybersecurity and Data Analytics – Covers big data security and interpretation.
IIA Standard 2120 – Risk Management in Big Data Analytics – Focuses on internal auditors' role in overseeing data-driven decision-making.
IIA References:
Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?
Decentralized
Centralized
Departmentalized
Tall structure
A decentralized organizational structure allows decision-making authority to be distributed across various levels and locations, making it more flexible and adaptable to rapid changes and uncertainties.
Why Decentralization Helps in Uncertainty?
Decentralization empowers different units or teams to make faster decisions.
It enables quick adaptation to market shifts, technological advancements, and external disruptions.
According to IIA’s Organizational Governance Guidelines, decentralized structures increase agility and responsiveness, particularly in dynamic industries like technology and finance.
Characteristics of Decentralized Structures:
Autonomy at multiple levels – decisions are not centralized at the top.
Faster decision-making – local teams react quickly to changes.
Greater innovation and flexibility – promotes problem-solving without bureaucratic delays.
Why Not Other Options?
B. Centralized:
A centralized structure concentrates decision-making at the top, slowing down responsiveness to changes.
C. Departmentalized:
While departmentalization organizes work efficiently, it may restrict cross-functional collaboration, making adaptation slower.
D. Tall Structure:
Tall structures have multiple management layers, leading to bureaucracy and slower decision-making.
IIA Practice Guide: Organizational Governance
IIA Standard 2110 – Governance and Risk Management
COBIT 2019 – Enterprise Risk and Governance Framework
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is A. Decentralized.
When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes.
The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion.
The risk that database administrators set up personalized accounts for themselves, making the audit time consuming.
The risk that database administrators could make hidden changes using privileged access.
Database administrators (DBAs) have privileged access, meaning they can make unauthorized or hidden changes to data, database structures, and security settings without detection. This presents a high risk of fraud, data manipulation, and security breaches.
A. The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes. (Incorrect)
While resistance from DBAs during an audit can be a challenge, it is not a significant risk compared to the ability to manipulate data unnoticed.
B. The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion. (Incorrect)
Patch management is a security concern but does not directly relate to the unique risk of DBAs abusing privileged access.
C. The risk that database administrators set up personalized accounts for themselves, making the audit time-consuming. (Incorrect)
While personal accounts can complicate audits, the greater risk is that DBAs can make changes without detection.
IIA GTAG 4 – Management of IT Auditing emphasizes the need for controls over privileged access to prevent unauthorized database modifications.
IIA Standard 2110 – Governance requires internal auditors to assess risks related to IT governance and privileged access management.
IIA GTAG 8 – Auditing Application Controls highlights that auditors must review DBA activity logs and ensure segregation of duties.
Explanation of Answer Choices:IIA References:Thus, the correct answer is D. The risk that database administrators could make hidden changes using privileged access.
Management is pondering the following question:
"How does our organization compete?"
This question pertains to which of the following levels of strategy?
Functional-level strategy
Corporate-level strategy.
Business-level strategy,
DepartmentsHevet strategy
Understanding Strategic Levels in an Organization:
Corporate-Level Strategy: Defines overall company direction, including mergers, acquisitions, and diversification.
Business-Level Strategy: Focuses on how the company competes in its industry (e.g., cost leadership, differentiation).
Functional-Level Strategy: Relates to specific departments (marketing, HR, IT) supporting business-level goals.
Why Option C (Business-Level Strategy) Is Correct?
The question "How does our organization compete?" directly relates to business-level strategy.
It focuses on competitive positioning within the industry, such as:
Cost leadership (competing on price)
Differentiation (unique product offerings)
IIA Standard 2110 – Governance requires auditors to evaluate strategic alignment with competitive positioning.
Why Other Options Are Incorrect?
Option A (Functional-Level Strategy):
Focuses on departmental decisions, not overall competition.
Option B (Corporate-Level Strategy):
Corporate strategy defines broad company direction, not specific competition strategies.
Option D (Department-Level Strategy):
Similar to functional strategy, it does not define how the company competes in the industry.
Business-level strategy answers "How does our organization compete?" by defining industry-specific competitive approaches.
IIA Standard 2110 supports governance over strategic positioning.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Strategic Planning & Competitive Advantage)
Porter’s Competitive Strategy Framework
COSO ERM – Strategic Risk Management
Which of the following networks is suitable for an organization that has operations In multiple cities and countries?
Wide area network.
Local area network
Metropolitan area network.
Storage area network.
A Wide Area Network (WAN) is the most suitable type of network for an organization that has operations in multiple cities and countries. WANs connect multiple local area networks (LANs) and other types of networks across long geographical distances, enabling seamless communication and data sharing among remote offices and branches.
A. Wide Area Network (WAN) (Correct Answer)
WANs cover extensive geographical areas, such as multiple cities, countries, or even continents.
They use various communication technologies, including leased lines, satellite connections, VPNs, and MPLS.
WANs enable organizations with distributed operations to centralize data management and enhance business continuity.
Example: An international corporation like a multinational bank or a global retail chain relies on a WAN to link its offices worldwide.
B. Local Area Network (LAN) (Incorrect Answer)
LANs are confined to a small area, such as an office building, factory, or campus.
They provide high-speed connectivity but are not designed for geographically dispersed locations.
Example: A single office using Ethernet and Wi-Fi to connect employees’ devices.
C. Metropolitan Area Network (MAN) (Incorrect Answer)
MANs span a city or a large campus but do not extend to multiple countries.
Example: A city's government agencies using a fiber-optic MAN for interdepartmental communication.
D. Storage Area Network (SAN) (Incorrect Answer)
SANs are dedicated high-speed networks designed for large-scale data storage and retrieval.
They are not meant for interconnecting geographically dispersed locations.
Example: A financial institution using a SAN for high-speed access to critical databases.
The IIA’s Global Technology Audit Guide (GTAG) – IT Risks and Controls emphasizes the importance of network infrastructure in securing and managing organizational data across multiple locations.
IIA Standard 2110 – Governance requires internal auditors to evaluate whether the organization’s IT strategy (including WAN infrastructure) supports business objectives and risk management.
IIA GTAG 17 – Auditing Network Security highlights the importance of WAN security, VPNs, and encryption when managing international operations.
Explanation of Answer Choices:IIA References:Thus, the correct answer is A. Wide Area Network (WAN).
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
The organization reports inappropriate estimates and accruals due to poof accounting controls.
The organization uses an unreliable process forgathering and reporting executive compensation data.
The organization experiences increasing discontent of employees, if executives are eligible for compensation amounts that are deemed unreasonable.
The organization encourages employee behavior that is inconsistent with the interests of relevant stakeholders.
When executive compensation is tied to financial results, there is a strong incentive to manipulate financial reporting or focus solely on short-term performance at the expense of stakeholders’ interests.
Potential for Unethical Behavior:
Executives may prioritize profit-driven decisions (e.g., cost-cutting, aggressive revenue recognition) over long-term sustainability.
As per IIA Standard 2110 – Governance, incentive structures should align with ethical business practices and stakeholder interests.
Increased Risk of Fraud and Misrepresentation:
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Fraud Risk Management Guide highlights how executive incentives can lead to financial statement manipulation.
This could result in actions like aggressive revenue recognition, improper expense deferrals, or overstating earnings to boost compensation.
Misalignment with Stakeholder Interests:
Employees, customers, and investors suffer if executive compensation encourages short-term gains over long-term stability.
IIA GTAG 3: Continuous Auditing supports monitoring financial reporting risks to detect such inconsistencies.
A. The organization reports inappropriate estimates and accruals due to poor accounting controls. (Incorrect)
Reason: While poor controls can contribute to misstatements, the root cause in this scenario is compensation structure, not control weakness.
B. The organization uses an unreliable process for gathering and reporting executive compensation data. (Incorrect)
Reason: This issue relates to HR and payroll data integrity, not the impact of performance-based compensation on behavior.
C. The organization experiences increasing discontent of employees, if executives are eligible for compensation amounts that are deemed unreasonable. (Incorrect)
Reason: While excessive executive pay may cause employee dissatisfaction, the question focuses on behavioral impacts on stakeholders, making D the more relevant choice.
IIA Standard 2110 – Governance – Ensures executive compensation aligns with organizational ethics and stakeholder interests.
IIA Standard 2120 – Risk Management – Covers the risks associated with incentive-based compensation.
COSO Fraud Risk Management Guide – Discusses financial fraud linked to executive compensation.
IIA GTAG 3: Continuous Auditing – Supports risk-based monitoring of financial statements.
Why is Answer D Correct?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is D. The organization encourages employee behavior that is inconsistent with the interests of relevant stakeholders.
While conducting an audit of the accounts payable department, an internal auditor found that 3% of payments made during the period under review did not agree with the submitted invoices. Which of the following key performance indicators (KPIs) for the department would best assist the auditor in determining the significance of the test results?
A KPI that defines the process owner's tolerance for performance deviations.
A KPI that defines the importance of performance levels and disbursement statistics being measured.
A KPI that defines timeliness with regard to reporting disbursement data errors to authorized personnel.
A KPI that defines operating ratio objectives of the disbursement process.
Key Performance Indicators (KPIs) are used to measure and monitor the effectiveness of a process within an organization. In this case, the internal auditor found that 3% of payments did not match submitted invoices, which indicates a potential control weakness in the accounts payable process.
Process Owner’s Tolerance for Performance Deviations (Correct Answer: A)
The most relevant KPI would be one that sets acceptable error limits for invoice payments.
IIA Standard 2120 – Risk Management states that auditors should assess management's risk tolerance and evaluate whether processes are operating within acceptable limits.
If the organization's threshold for errors is 1% and the audit found 3%, it indicates a significant issue requiring corrective action.
This KPI helps the auditor assess materiality and determine the significance of the 3% deviation.
Why the Other Options Are Incorrect:
B. KPI defining the importance of performance levels and disbursement statistics (Incorrect)
While understanding performance levels and disbursement statistics is useful, this KPI does not directly address error tolerance or the impact of deviations.
C. KPI defining timeliness of reporting disbursement errors (Incorrect)
Reporting errors quickly is important, but this KPI does not help in determining whether a 3% error rate is acceptable or excessive.
D. KPI defining operating ratio objectives (Incorrect)
Operating ratio objectives focus on financial efficiency rather than error tolerance or accuracy in invoice processing.
IIA Standard 2120 – Risk Management (Assessing risk tolerance in financial processes)
IIA Standard 2210 – Engagement Objectives (Evaluating process performance against defined thresholds)
IIA Standard 2130 – Compliance (Ensuring adherence to financial control policies)
Step-by-Step Justification:IIA References for This Answer:Thus, the best answer is A. A KPI that defines the process owner's tolerance for performance deviations, as it directly helps the auditor assess the materiality of the 3% error rate in accounts payable.
An organization contracted a third-party service provider to plan, design, and build a new facility. Senior management would like to transfer all of the risk to the builder. Which type of procurement contract would the organization use?
Cost-plus contract.
Turnkey contract.
Service contract.
Solutions contract.
A turnkey contract is a type of procurement agreement where the contractor is responsible for the entire project from planning and design to construction and delivery, ensuring that the organization receives a fully operational facility. In this case, the organization wants to transfer all risks to the builder, making a turnkey contract the most appropriate choice.
Full Risk Transfer: The contractor assumes all project risks, including design flaws, cost overruns, and delays.
Single-Point Responsibility: The builder is accountable for all aspects of the project until it is fully operational.
Minimal Client Involvement: The client does not have to manage the project’s complexities.
Option A (Cost-plus contract): This contract type does not transfer all risk to the builder; instead, the client bears some risk as they pay for actual costs plus a profit margin.
Option C (Service contract): Service contracts typically cover specific services (e.g., maintenance, consulting), not full construction projects.
Option D (Solutions contract): A solutions contract generally refers to software or technology solutions, not physical facility construction.
IIA’s Practice Guide on Contract Management and Risk Transfer: Highlights turnkey contracts as a method to shift project risks to third parties.
IIA’s Business Knowledge for Internal Auditing (CIA Exam Part 3 Syllabus): Covers procurement and contract types, emphasizing risk transfer mechanisms.
Why Option B is Correct:Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is B. Turnkey contract.
Which of the following business practices promotes a culture of high performance?
Reiterating the importance of compliance with established policies and procedures.
Celebrating employees' individual excellence.
Periodically rotating operational managers.
Avoiding status differences among employees.
A high-performance culture is one where employees are motivated to achieve excellence, innovate, and contribute to organizational success. This requires recognition of individual contributions, team collaboration, and strong leadership.
Let's analyze each option:
A. Reiterating the importance of compliance with established policies and procedures.
Incorrect. While compliance is crucial for governance and risk management, simply enforcing policies does not inherently promote high performance. High-performance cultures go beyond compliance to encourage innovation, creativity, and ownership.
B. Celebrating employees' individual excellence. ✅ (Correct Answer)
Correct. Recognizing and rewarding employees for their achievements, innovation, and outstanding performance fosters motivation, engagement, and a culture of continuous improvement.
Examples include employee recognition programs, awards, and performance-based incentives.
C. Periodically rotating operational managers.
Incorrect. While job rotation can provide exposure to different roles, frequent changes in leadership may disrupt continuity and stability, potentially harming long-term performance.
D. Avoiding status differences among employees.
Incorrect. While reducing hierarchical barriers can improve collaboration, completely eliminating status differences is unrealistic. A well-structured leadership framework helps set clear roles, expectations, and accountability.
IIA Standard 2110 – Governance – Encourages fostering a performance-driven culture.
COSO ERM Framework – Performance & Strategy Alignment – Discusses the role of motivation and recognition in achieving organizational goals.
ISO 30414 – Human Capital Reporting – Covers employee engagement and performance culture.
IIA Practice Guide – Evaluating Corporate Culture – Highlights employee recognition as a key factor in high-performance environments.
IIA References:
An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?
Infrastructure as a Service (laaS).
Platform as a Service (PaaS).
Enterprise as a Service (EaaS).
Software as a Service (SaaS).
If an organization has an immediate need for servers but lacks time for a capital acquisition, the best solution is Infrastructure as a Service (IaaS).
On-Demand Computing Power: IaaS provides virtual servers, storage, and networking resources on a pay-as-you-go basis, eliminating the need for capital purchases.
Scalability & Flexibility: The organization can quickly deploy the necessary infrastructure without long procurement processes.
Reduced IT Management Overhead: The cloud provider manages the hardware, while the organization manages the applications and data.
Option B (Platform as a Service – PaaS): PaaS offers a development environment for building applications, not infrastructure (e.g., servers and networking).
Option C (Enterprise as a Service – EaaS): EaaS is not a standard cloud service model recognized by NIST (National Institute of Standards and Technology) or ISO 17788.
Option D (Software as a Service – SaaS): SaaS provides software applications over the internet (e.g., Gmail, Microsoft 365) but does not address server needs.
IIA’s Global Technology Audit Guide (GTAG) on Cloud Computing emphasizes IaaS as a viable solution for organizations requiring immediate infrastructure deployment.
NIST Special Publication 800-145 (Cloud Computing Definition) defines IaaS as a method to deliver computing resources efficiently without physical acquisition.
IIA Standard 2110 – IT Governance: Highlights the importance of agile IT solutions for meeting business needs, including cloud computing.
Why Option A is Correct (IaaS):Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is A. Infrastructure as a Service (IaaS).
Which of the following is a limitation of the remote wipe for a smart device?
Encrypted data cannot be locked to prevent further access
Default settings cannot be restored on the device.
All data, cannot be completely removed from the device
Mobile device management software is required for successful remote wipe
Remote wipe is not always 100% effective: While remote wiping can delete most user data, some residual data may remain on the device, especially in cases where:
The device has built-in storage redundancies.
Deleted data can be recovered using forensic tools.
The remote wipe command fails to execute properly due to network issues or device settings.
Security Risk: This limitation poses a risk for organizations handling sensitive or confidential data, as unauthorized individuals may recover wiped data.
IIA Standard 2110 - Governance: Internal auditors must assess how organizations manage IT security risks, including risks related to mobile devices and data protection.
IIA Practice Guide: Auditing Cybersecurity Risks highlights the need to evaluate mobile security controls and limitations of data removal techniques.
A. Encrypted data cannot be locked to prevent further access (Incorrect)
Encrypted data remains secure even if the device is lost.
Many enterprise security solutions allow organizations to revoke encryption keys remotely, making data inaccessible.
IIA Standard 2120 - Risk Management advises that effective encryption reduces the impact of data loss.
B. Default settings cannot be restored on the device. (Incorrect)
Most remote wipe solutions allow factory reset, restoring the device to default settings.
Many mobile device management (MDM) tools support full device restoration.
D. Mobile device management software is required for a successful remote wipe. (Incorrect)
While MDM enhances remote wiping capabilities, it is not strictly required.
Some consumer and enterprise mobile operating systems (e.g., iOS, Android) provide built-in remote wipe functionality without MDM.
Explanation of Answer Choice C (Correct Answer):Explanation of Incorrect Answers:Conclusion:Remote wipe has limitations, and the inability to completely remove all data from the device (Option C) is a primary concern.
IIA References:
IIA Standard 2110 - Governance
IIA Standard 2120 - Risk Management
IIA Practice Guide: Auditing Cybersecurity Risks
Which of the following is an example of a physical control designed to prevent security breaches?
Preventing database administrators from initiating program changes
Blocking technicians from getting into the network room.
Restricting system programmers' access to database facilities
Using encryption for data transmitted over the public internet
Physical controls are security measures that prevent unauthorized physical access to critical assets, such as IT infrastructure, sensitive documents, or restricted areas.
(A) Preventing database administrators from initiating program changes:
This is a logical (IT) control rather than a physical control. Logical controls manage access permissions and prevent unauthorized software changes.
(B) Blocking technicians from getting into the network room (Correct Answer):
This is a physical control because it prevents unauthorized personnel from physically accessing critical IT infrastructure, such as servers and networking devices.
Unauthorized access to a network room could lead to data breaches, hardware manipulation, or cyberattacks.
(C) Restricting system programmers' access to database facilities:
This is an access control measure, which can be either logical (permissions, role-based access) or physical. However, it primarily refers to IT access controls rather than a physical security measure.
(D) Using encryption for data transmitted over the public internet:
This is a technical control, not a physical one. Encryption protects data but does not prevent physical breaches.
IIA GTAG 17: Auditing IT Security – Emphasizes the role of physical security in protecting IT infrastructure.
COBIT Framework – DSS05 (Manage Security Services) – Highlights physical access restrictions as a key security measure.
ISO/IEC 27001: Information Security Management System – Identifies physical security as a fundamental control for IT risk management.
Analysis of Each Option:IIA References:Conclusion:Since physical security controls prevent unauthorized physical access, option (B) is the correct answer.
Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?
Lower shareholder control
lower indebtedness
Higher company earnings per share.
Higher overall company earnings
When a company finances through bonds (debt) instead of issuing common stock (equity), it increases earnings per share (EPS) because bond financing does not dilute ownership, whereas issuing new stock does.
Impact on Earnings Per Share (EPS):
EPS formula: EPS=Net Income−Preferred DividendsNumber of Outstanding Shares\text{EPS} = \frac{\text{Net Income} - \text{Preferred Dividends}}{\text{Number of Outstanding Shares}}EPS=Number of Outstanding SharesNet Income−Preferred Dividends
Since bond financing does not increase the number of shares outstanding, net income is distributed among fewer shareholders, increasing EPS.
If the company issues more stock instead of bonds, EPS decreases because the same earnings are divided among more shares.
Why Bond Financing Affects EPS Favorably:
Interest on bonds is tax-deductible, reducing taxable income and increasing net profits.
Unlike dividends, which are paid on common stock and reduce retained earnings, bondholders receive fixed interest payments that do not dilute equity ownership.
A. Lower shareholder control: ❌
Bondholders do not get voting rights, whereas issuing more stock reduces existing shareholders’ control.
This statement would be true for stock financing, not bond financing.
B. Lower indebtedness: ❌
Bonds increase a company’s debt obligations, not reduce them.
If a company uses stock financing instead of bonds, it avoids taking on debt.
D. Higher overall company earnings: ❌
While bonds increase EPS, they do not necessarily increase total earnings.
The company must pay interest on bonds, which could reduce net income if not managed properly.
IIA Standard 2110 (Governance): Ensures management selects financing strategies that align with financial stability.
COSO ERM Framework – Financial Risk Management: Evaluates how financing choices impact shareholder value and risk exposure.
IFRS & GAAP Accounting Standards on Debt vs. Equity Financing: Explain how bond financing increases EPS compared to issuing new shares.
Step-by-Step Justification:Why Not the Other Options?IIA References:
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
A flat structure results in lower operating and support costs than a hierarchical structure.
A flat structure results in a stable and very collaborative environment.
A flat structure enables field auditors to report to and learn from senior auditors.
A flat structure is more dynamic and offers more opportunities for advancement than a hierarchical structure.
Understanding Organizational Structures in Internal Audit:
A flat organizational structure has fewer levels of management, leading to faster decision-making, less bureaucracy, and lower administrative costs.
A hierarchical structure has multiple levels of management, which may improve control and oversight but increases complexity and costs.
Why a Flat Structure Reduces Operating and Support Costs:
Fewer management layers mean fewer salaries and reduced administrative expenses.
Streamlined decision-making reduces inefficiencies in reporting and communication.
Leaner support functions lead to cost savings in internal audit activity.
Why Other Options Are Less Relevant:
B. Stable and collaborative environment: Collaboration depends on culture, not just structure. Hierarchical models can also be collaborative.
C. Enables field auditors to report to senior auditors: This is more common in hierarchical structures where clear reporting lines exist.
D. More dynamic with advancement opportunities: Hierarchical structures often provide clearer career progression due to well-defined promotion paths.
IIA Standard 2030 – Resource Management: Encourages optimizing resources, which a flat structure can support.
IIA Practice Guide on Effective Internal Audit Governance: Discusses structural efficiency and cost control in internal audit.
COSO’s Internal Control Framework: Emphasizes efficient resource allocation in governance structures.
Relevant IIA References:✅ Final Answer: A flat structure results in lower operating and support costs than a hierarchical structure (Option A).
Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?
Managerial accounting uses double-entry accounting and cost data.
Managerial accounting uses general accepted accounting principles.
Managerial accounting involves decision making based on quantifiable economic events.
Managerial accounting involves decision making based on predetermined standards.
Managerial accounting differs from financial accounting in that it focuses on internal decision-making, cost control, and performance evaluation based on predetermined standards. Unlike financial accounting, which follows GAAP (Generally Accepted Accounting Principles) for external reporting, managerial accounting sets internal benchmarks to guide operational efficiency and strategic planning.
Use of Predetermined Standards:
Managerial accounting often uses standard costing, budgets, and variance analysis to compare actual performance against pre-set benchmarks.
This helps management make data-driven decisions and improve efficiency.
Internal Decision-Making:
Managerial accounting reports are used by internal stakeholders (e.g., managers, executives) rather than external entities.
Control and Performance Measurement:
It focuses on variance analysis (actual vs. expected performance) to highlight areas requiring corrective action.
Not Governed by GAAP:
Unlike financial accounting, managerial accounting does not require compliance with GAAP or IFRS since it is meant for internal use only.
A. Managerial accounting uses double-entry accounting and cost data:
While cost data is relevant to managerial accounting, double-entry accounting is a fundamental principle of all accounting systems, including financial accounting.
B. Managerial accounting uses generally accepted accounting principles (GAAP):
GAAP is required for financial accounting (external reporting), but managerial accounting does not follow GAAP since it focuses on internal decision-making.
C. Managerial accounting involves decision making based on quantifiable economic events:
While managerial accounting analyzes economic data, its distinguishing feature is using predetermined standards to evaluate and improve performance, which makes Option D the best choice.
IIA Standard 2110 - Governance: Internal auditors should assess decision-making processes, including managerial accounting techniques.
IIA Standard 2120 - Risk Management: Cost control and budget variance analysis are key components of risk management.
COSO Framework - Performance Monitoring: Emphasizes variance analysis, which aligns with predetermined standards in managerial accounting.
Key Reasons Why Option D is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is D. Managerial accounting involves decision making based on predetermined standards.
During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?
Initiation phase
Bidding phase
Development phase
Negotiation phase
During the initiation phase of contracting, the organization assesses whether the market conditions, supplier capabilities, and contract objectives align with the strategic goals and operational needs of the organization. This phase is critical because it sets the foundation for the entire contracting process, ensuring that the business environment, risks, and potential opportunities are well understood before proceeding.
Market Analysis & Alignment with Organizational Objectives:
The organization conducts market research to evaluate supplier capabilities, industry trends, pricing structures, and risk factors.
This helps determine whether external providers can meet the organization’s needs and objectives.
Aligning market opportunities with organizational strategy is crucial to ensure a contract is viable and beneficial.
Risk Identification & Assessment:
Potential risks such as supply chain disruptions, vendor reliability, and compliance issues are analyzed.
Internal auditors may assess historical performance and external market conditions.
Stakeholder Involvement & Approval:
Internal stakeholders (finance, legal, procurement, and operational teams) collaborate to define the contracting requirements.
The organization sets high-level objectives, including cost-effectiveness, quality standards, and compliance expectations.
Preliminary Budgeting & Feasibility Analysis:
The organization estimates the financial impact of potential contracts and ensures alignment with budgetary constraints.
Initial cost-benefit analysis is conducted to determine contract viability.
Bidding Phase (B): This occurs later in the process when vendors submit proposals, and the organization evaluates them against predefined criteria. It does not focus on market alignment but rather vendor selection.
Development Phase (C): This phase involves drafting the contract terms, service level agreements (SLAs), and detailed responsibilities. Market alignment has already been considered in the initiation phase.
Negotiation Phase (D): Here, the organization finalizes terms and conditions with the selected vendor, focusing on cost, deliverables, and legal requirements rather than market alignment.
IIA’s International Professional Practices Framework (IPPF) – Standard 2120 (Risk Management): This standard emphasizes that organizations must assess external risks (including market conditions) to align with strategic objectives.
IIA’s Global Technology Audit Guide (GTAG) on Contract Management: This guide highlights the importance of market analysis in the initiation phase to ensure contracts support organizational objectives.
IIA’s Practice Guide: Auditing Contract Management: It states that an effective contract management process starts with a thorough market assessment and strategic alignment in the initiation phase.
Step-by-Step Breakdown:Why Not the Other Phases?IIA References:
A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?
The company's code of ethics.
The third-party management risk register.
The signed service-level agreement.
The subcontractors' annual satisfaction survey.
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?
The term describes budgets that exclude fixed costs.
Flexible budgets exclude outcome projections, which are hard to determine, and instead rely on the most recent actual outcomes.
The term is a red flag for weak budgetary control activities.
Flexible budgets project data for different levels of activity.
Definition of Flexible Budgets:
Flexible budgeting allows organizations to adjust budgeted expenses based on actual performance levels.
Unlike static budgets, flexible budgets provide different financial projections for varying levels of activity.
Why Flexible Budgets are Useful:
They adjust for actual business conditions, making them useful in planning and cost control.
Organizations can compare actual results against the appropriate budget level rather than a single static budget.
Why Other Options Are Incorrect:
A. Exclude fixed costs: Fixed costs are included; only variable costs change with activity levels.
B. Exclude outcome projections: Flexible budgets still use projected outcomes but adjust them based on actual performance.
C. Red flag for weak control: Flexible budgets enhance control by allowing real-time adjustments, making them a best practice rather than a red flag.
IIA GTAG on Financial Management: Covers budgeting methods, including flexible budgeting.
IIA Standard 2120 – Risk Management: Encourages adaptive financial planning for effective risk management.
COSO ERM Framework: Recommends dynamic financial planning, including flexible budgeting.
Relevant IIA References:✅ Final Answer: Flexible budgets project data for different levels of activity (Option D).
A third party who provides payroll services to the organization was asked to create audit or “read-only 1 functionalities in their systems. Which of the following statements is true regarding this request?
This will support execution of the right-to-audit clause.
This will enforce robust risk assessment practices
This will address cybersecurity considerations and concerns.
This will enhance the third party's ability to apply data analytics
A right-to-audit clause in a contract allows an organization to review and assess the operations, controls, and security measures of a third-party service provider (such as payroll service providers). Providing "read-only" functionalities supports this clause by enabling internal auditors to access and review relevant data without modifying it.
Read-only access allows auditors to verify transactions, data integrity, and compliance without affecting system operations.
This ensures that internal audit functions can review third-party controls without interference, supporting contractual audit rights.
The IIA’s Standard 2070 – External Service Provider Relationships states that organizations should retain the right to audit outsourced functions to ensure compliance with internal control policies.
B. This will enforce robust risk assessment practices → Incorrect. While read-only access can contribute to risk assessment, it does not directly enforce risk management policies.
C. This will address cybersecurity considerations and concerns. → Incorrect. Cybersecurity concerns involve encryption, authentication, and intrusion detection—not just read-only access.
D. This will enhance the third party's ability to apply data analytics → Incorrect. The request is for audit purposes, not to improve the third party’s analytics capabilities.
IIA’s Global Technology Audit Guide (GTAG) 7: IT Outsourcing recommends a right-to-audit clause in third-party agreements.
IIA Standard 1312 emphasizes that external audits should have transparent access to outsourced functions.
ISACA's COBIT Framework highlights the importance of audit access in managing third-party risks.
Why Option A is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is A. This will support execution of the right-to-audit clause.
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
Reviewing the customer's wire activity to determine whether the request is typical.
Calling the customer at the phone number on record to validate the request.
Replying to the customer via email to validate the sender and request.
Reviewing the customer record to verify whether the customer has authorized wire requests from that email address.
Phishing attacks often target financial institutions by impersonating customers and requesting fraudulent fund transfers. The best way to verify such requests is to independently contact the customer using a trusted communication channel, such as the phone number on record.
Verbal confirmation via a trusted number prevents fraudsters from exploiting email spoofing or compromised accounts.
This aligns with industry best practices, including multi-factor verification for high-risk transactions.
A. Reviewing the customer's wire activity to determine whether the request is typical. (Incorrect)
While reviewing transaction history can help detect anomalies, fraudsters can mimic previous transaction patterns, making this method unreliable on its own.
B. Calling the customer at the phone number on record to validate the request. (Correct)
Direct phone verification ensures that the actual account owner is making the request.
This is a widely recommended anti-fraud measure in financial institutions.
C. Replying to the customer via email to validate the sender and request. (Incorrect)
If the email account is compromised, the fraudster will control the response.
Email validation is not secure for financial transactions.
D. Reviewing the customer record to verify whether the customer has authorized wire requests from that email address. (Incorrect)
While this can help identify unregistered emails, attackers often spoof or hack real customer emails.
Email-based verification alone is not sufficient.
IIA GTAG 16 – Security Risk: IT and Cybersecurity recommends multi-factor authentication for high-risk financial transactions.
IIA Standard 2120 – Risk Management highlights the need for robust fraud prevention mechanisms, including direct customer verification.
FFIEC (Federal Financial Institutions Examination Council) Cybersecurity Guidelines emphasize the importance of out-of-band authentication for wire transfers.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. Calling the customer at the phone number on record to validate the request.
Which of the following would be the best method to collect information about employees' job satisfaction?
Online surveys sent randomly to employees.
Direct onsite observations of employees.
Town hall meetings with employees.
Face-to-face interviews with employees.
The best method to collect job satisfaction data is one that provides anonymous, broad, and consistent feedback while minimizing response bias. Online surveys are the most effective method because they allow employees to express their views freely and ensure statistical reliability in results.
Online Surveys (Correct Answer: A)
Online surveys allow anonymous responses, which encourage honest feedback without fear of retaliation.
Surveys can be distributed randomly, increasing representation and reducing bias.
They allow for large-scale data collection and quantitative analysis, which improves decision-making.
IIA Standard 2120 – Risk Management suggests that internal auditors evaluate employee engagement as part of organizational risk assessments.
Why the Other Options Are Incorrect:
B. Direct Onsite Observations (Incorrect)
Observation helps assess behavior, but it does not capture employees' emotions, satisfaction, or personal concerns effectively.
Employees may alter their behavior when being observed (Hawthorne Effect).
C. Town Hall Meetings (Incorrect)
Town halls encourage group discussion, but employees may be reluctant to share negative opinions publicly.
This format is not anonymous, which reduces the likelihood of honest feedback.
D. Face-to-Face Interviews (Incorrect)
While interviews provide detailed qualitative feedback, they are time-consuming and may not be scalable for large organizations.
Employees may hesitate to be fully honest due to potential supervisor influence.
IIA Standard 2120 – Risk Management (Assessing employee engagement and morale risks)
IIA Standard 2130 – Compliance (Ensuring ethical and employee engagement policies)
IIA Standard 2210 – Engagement Objectives (Using appropriate methodologies for employee feedback collection)
Step-by-Step Justification:IIA References for This Answer:Thus, the best answer is A. Online surveys sent randomly to employees because they ensure confidentiality, broad participation, and reliable data collection.