New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

How to Pass the IIA IIA-CIA-Part3 Exam: Comprehensive Business Knowledge for Internal Auditing Guide and Tips

Questions 1

Which of the following is the best example of IT governance controls?

Options:
A.

Controls that focus on segregation of duties, financial, and change management,

B.

Personnel policies that define and enforce conditions for staff in sensitive IT areas.

C.

Standards that support IT policies by more specifically defining required actions

D.

Controls that focus on data structures and the minimum level of documentation required

IIA IIA-CIA-Part3 Premium Access
Questions 2

Which of the following would be classified as IT general controls?

Options:
A.

Error listings.

B.

Distribution controls.

C.

Transaction logging.

D.

Systems development controls.

Questions 3

A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25.000 shirts. Actual sales total S300.000. What is margin of safety sales for the company?

Options:
A.

$100.000

B.

$200,000

C.

$275,000

D.

$500,000

Questions 4

Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?

Options:
A.

High-yield bonds

B.

Commodity-backed bonds

C.

Zero coupon bonds

D.

Junk bonds

Questions 5

Which of the following best describes the primary objective of cybersecurity?

Options:
A.

To protect the effective performance of IT general and application controls.

B.

To regulate users' behavior it the web and cloud environment.

C.

To prevent unauthorized access to information assets.

D.

To secure application of protocols and authorization routines.

Questions 6

Which of the following biometric access controls uses the most unique human recognition characteristic?

Options:
A.

Facial comparison using photo identification.

B.

Signature comparison.

C.

Voice comparison.

D.

Retinal print comparison.

Questions 7

Which of the following statements is true regarding change management?

Options:
A.

The degree of risk associated with a proposed change determines whether the change request requires authorization

B.

Program changes generally are developed and tested in the production environment.

C.

Changes are only required by software programs

D.

To protect the production environment, changes must be managed in a repeatable, defined, and predictable manner

Questions 8

Which of the following intangible assets is considered to have an indefinite life?

Options:
A.

Underground oil deposits

B.

Copyright

C.

Trademark

D.

Land

Questions 9

Which of the following situations best illustrates a "false positive" in the performance of a spam filter?

Options:
A.

The spam filter removed Incoming communication that included certain keywords and domains.

B.

The spam filter deleted commercial ads automatically, as they were recognized as unwanted.

C.

The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.

D.

The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.

Questions 10

An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?

Options:
A.

Face or finger recognition equipment,

B.

Radiofrequency identification chips to authenticate employees with cards.

C.

A requirement to clock in and clock out with a unique personal identification number.

D.

A combination of a smart card and a password to clock in and clock out.