Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CIMA P3 Practice Exam with Questions & Answers

Questions 1

An oil company has entered into a joint venture with a competing oil company to develop a new oil field. The joint venture arrangement is intended to mitigate the risks associated with developing the oil field.

The following disclosure appears in the oil company's risk report:

"Many of our large projects and operations are conducted through joint ventures. These arrangements involve complex risk allocation and indemnification arrangements and we have less control over these activities than we would have if we had full ownership and control. Our partners may have economic or business interests that are opposed to ours, and may exercise the right to block key decisions or actions. We believe the joint arrangement is in our best interest."

Which of the following statements are correct?

Options:
A.

The risk report means that the shareholders know exactly how bad the risk is.

B.

The risk report says nothing useful about the risk.

C.

Now the shareholders know the directors are aware of the risk.

D.

If the risk report had not reported the risk the shareholders might not have been aware of the risk.

E.

The shareholders now have more useful information.

CIMA P3 Premium Access
Questions 2

D has decided to invest in a new factory at a cost of $6,000,000. The discount rate of the project is 22% and the PV of tax shield is $80,000.

What is the IRR?

Give your answer to two decimal places.

Options:
Questions 3

Which of the following are true of an effective risk management culture?

Options:
A.

Staff should be penalised for being associated with negative events.

B.

All risk should be eliminated.

C.

Responsibility for risk management should be devolved to a risk manager.

D.

All staff should be aware of risks affecting the entity.

E.

Risk management should be regarded as part of the overall business strategy.

F.

The directors should take an active interest in risk management.

Questions 4

KLO is a major quoted car rental company The company is considering publishing its first cyber risk management report

AH rental bookings are made online Customers receive a booking reference number that they use to collect their cars from a convenient branch Customers enter their credit card details both so that KLO can take payment for their rental and also so that the customers can be charged automatically for late returns or damage to cars

KLO's management believes that it has three key areas of cyber risk Cyber criminals may wish to make bookings using fictitious data in order to steal KLO's cars, they may wish to use customers details to identify addresses of people who are away from home so that they can burgle houses and they may wish to abuse customer credit card details

KLO's Board is concerned that admitting to the nsk of stealing cars might encourage cnminals to exploit that vulnerability AJso. it is concerned that customers will be reluctant to rent cars if that would mean that their homes could be at risk of burglary while they are away The vulnerability of credit card details seems obvious and so the Board is not reluctant to admit to that.

Which TWO of the following are correct?

Options:
A.

The Board should be clear about all sensitive information that the company holds, but should also be clear about the robust controls in place to safeguard that information.

B.

If KLO's Board omits one of more areas of concern from the report then the independent accountant who will sign the report is unlikely to discover that omission

C.

The independent accountant who will express an opinion on the risks and controls will be unwilling to sign the report unless it contains a full account of all risks and controls

D.

The independent accountant's report on KLO's cyber risk management will refer only to those vulnerabilities that have been identified by KLO's Board

E.

Stakeholders will not care about the vulnerabilities faced by KLO provided the independent accountant can confirm that the company has sound systems in place

Questions 5

DFR is an online retailer that sells picture frames The software running on DFR's website enables customers to log in and make purchases by inputting an email address as a user name and a password that must contain at least eight characters, including upper and lower case letters, numbers and punctuation marks (e.g. £, $ or!) Once logged in, customers can check previous orders that they have placed.

Customers can also use DFR's website to change personal details, including credit card numbers and delivery addresses Whenever they wish to use those facilities, the software sends a text message containing a six-digit number to their mobile phones They must input that number before the system will accept changes to their personal details

Which TWO of the following statements are correct?

Options:
A.

It is illogical to have different security measures in place for orders and for access to personal details.

B.

The software treats customers' personal details as being more sensitive than their ordering histories

C.

The arrangement with the text message will have no effect on the security associated with changing personal details

D.

Customers should be able to update the mobile phone numbers in their DFR accounts using only their email addresses and passwords for access

E.

The software should never show the whole of a customer's credit card number on screen, even if the customer has logged in and input the six-digit number.

Questions 6

A has an opportunity to invest $90,000 in a project that is expected to generate annual cash inflows of $60,000 for each of the next three years. The project's beta coefficient implies a discount rate of 12% for this project, based on a risk-free rate of return of 3%.

A is prepared to forego the expected cash flows from this project in return for a guaranteed payment of $50,000 at the end of year 1, $42,000 at the end of year 2 and $30,000 at the end of year 3.

What is the certainty equivalent value of this opportunity to A?

Options:
A.

$9,493

B.

$25,606

C.

$54,120

D.

$115,606

Questions 7

An IT security consultant has been asked to conduct a forensic analysis of a client’s systems after the discovery of a system breach The consultant discovered several fake user accounts that appeared to have been created by the perpetrators of the breach Before deleting the accounts, the consultant took care to copy as much detail as possible concerning the accounts.

Which TWO of the following are valid explanations for the consultant's decision to copy the details concerning the fake accounts'?

Options:
A.

The details could be of value as evidence in any subsequent criminal trial.

B.

If the fake accounts reappear after deletion that will be a warning that the breach has recurred.

C.

The client could use the account details to target a breach of the perpetrator's systems.

D.

The consultant can charge more for the time spent analysing the fake accounts.

E.

The analysis of the accounts might help the consultant understand the motive for the breach.

Questions 8

Smalltown had a problem with people parking cars on the town's mam shopping streets instead of in the nearby car parks The parked cars created congestion and made it difficult for delivery vehicles to unload Smalltown's local government had employed traffic wardens to enforce parking regulations by issuing parking fines to motorists who parked for more than the permitted 30 minutes.

The local government took further action to deal with this problem It banned parking on the busiest streets, it introduced parking charges in the remaining streets and it made it free to park m the town's car parks for up to two hours Fewer people now park cars on the streets because of the charges, but those who do generate significant revenues for the local government Fewer traffic wardens are required and so wage costs have reduced

The local goverment auditors have decided to carry out a value for money audit of the parking system

Which of the following is a measure of effectiveness?

Options:
A.

The main shopping streets are no longer congested

B.

The remaining traffic wardens are less stressed because they no longer receive abuse by motorists.

C.

Parking enforcement costs less than before

D.

Revenues from parking have increased

Questions 9

Which of the following statements are true of economic risk?

Options:
A.

Economic risk is easy to measure

B.

Economic risk may be caused by international trade

C.

Economic risk is something which cannot be avoided

D.

Economic risk is influenced by many factors

Questions 10

M is updating the risk register for KRW, a listed company. KRW is a large multinational corporation operation. Which THREE of the following statements are correct?

Options:
A.

The register should include all the risks to which KRW is exposed.

B.

Interdependencies between risks should be excluded.

C.

The register should include details of who is responsible for dealing with each risk.

D.

Monetary value of risks should be allocated if possible.

E.

Probabilities of risks occurring should be included if possible