New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

How to Pass the IIA IIA-CIA-Part3-3P Exam: Comprehensive CIA Exam Part Three: Business Knowledge for Internal Auditing Guide and Tips

Questions 1

The balanced scorecard approach differs from traditional performance measurement approaches because it adds which of the following measures?

1) Financial measures

2) Internal business process measures.

3) Client satisfaction measures

4) Innovation and learning measures

Options:
A.

1 only.

B.

2 and 4 only.

C.

3 and 4 only.

D.

2, 3, and 4 only

IIA IIA-CIA-Part3-3P Premium Access
Questions 2

An organization has received funding to continue a program that utilizes an in-house Due to new legislative requirements the application will require additional features to capture information not previously collected Which of the following is the most critical for completing this specific project?

Options:
A.

A detailed budget that identifies hardware resources for the project

B.

A Gantt chart that identifies the critical path for completing the project

C.

Change management controls to avoid technical conflicts within the application

D.

A project plan with a flexible scope to accommodate legislative requirements

Questions 3

Which of the following re a result of implementing an e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and billing?

Options:
A.

Higher cash flow and treasury balances

B.

Higher inventory balances

C.

Higher accounts receivable

D.

Higher accounts payable

Questions 4

In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as part of reviewing workstations?

Options:
A.

Input controls.

B.

Segregation of duties.

C.

Physical controls.

D.

Integrity controls.

Questions 5

A bicycle manufacturer incurs a combination of fixed and variable costs with the production of each bicycle Which of the following statements true recording these costs?

Options:
A.

If the number of bicycles produced is increased by 15 percent, the variable cost per unit will increase proportionally

B.

The fixed cost per unit will vary directly based on the number of bicycles produced during the

production cycle

C.

The total variable cost will vary proportionally and inversely with the number of bicycles produced during a production run

D.

If the number of bicycles produced is increased by 30 percent the fixed cost per unit will decline

Questions 6

Which of the following can be classified as debt investments?

Options:
A.

Investments in the capital stock of a corporation.

B.

Acquisition of government bonds.

C.

Contents of an investment portfolio.

D.

Acquisition of common of a stock corporation.

Questions 7

With regard to project management when of the following statements about prefect crashing is true?

Options:
A.

It leads to an increase in risk and often results in rework

B.

It is an optimization technique where activities are performed in parallel rather than sequentially

C.

It involves a revaluation of protect requirements and/or scope.

D.

It is a compression technique in which resources are added to the protect

Questions 8

Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?

Options:
A.

Key performance indicators

B.

Reports of software customization

C.

Change and patch management

D.

Master data management

Questions 9

When using data analytics during a review of the procurement process, what is the first step in the analysis process?

Options:
A.

Identify data anomalies and outliers

B.

Define questions to be answered

C.

Identify data sources available

D.

Determine the scope of the data extract.

Questions 10

Which of the following IT-related activities is most commonly performed by the second line of defense?

Options:
A.

Block unauthorized traffic.

B.

Encrypt data.

C.

Review disaster recovery test results.

D.

Provide independent assessment of IT security.