According to MA guidance, which of the following statements is true regarding internal auditors' use of technology-based techniques?
Upon completion of an external quality assessment, which of the following would the chief audit executive be required to report to the board?
An organization is implementing a new cybersecurity policy and has established a committee to ensure stakeholder alignment across the organization's infrastructure, network, and security teams. The head of the committee has asked the chief audit executive if the internal audit activity could play a role in these efforts. According to HA guidance, which of the following is the most appropriate response?
Management decided to post the organization's newly established code of conduct on its website. This decision is primarily intended to mitigate which of the following risks?
Which of the following offers the best evidence that the internal audit activity has achieved organizational independence?
Which of the following organizations has reached the most mature level of corporate social responsibility?
The results of an assessment of the adequacy of controls would be considered incomplete or misleading unless the internal auditor considers which of the following?
An accounts payable clerk who has access to the vendor master file replaced the payment details of a legitimate vendor with those of a friend before processing the payment through the organization's cashier. Immediately afterward, he restored the original vendor information. Which of the following controls could have prevented this fraud?
Which of the following scenarios best illustrates a rationalization as the root cause of potential fraud?
Under which of the following circumstances should the final audit report include a disclosure of nonconformance with the Standards?
|
PDF + Testing Engine
|
|---|
|
$49.5 |
|
Testing Engine
|
|---|
|
$37.5 |
|
PDF (Q&A)
|
|---|
|
$31.5 |
IIA Free Exams |
|---|
|