Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free IIA IIA-CIA-Part3-3P Practice Exam with Questions & Answers | Set: 10

Questions 91

Which of the following techniques would be least effective in resolving the conflict created by an internal audit client's perception of the audit report as a personal attack on his management performance?

Options:
A.

The auditor should focus on the audit client as a person and understand him, rather than just

concentrating on the problem.

B.

The auditor should make recommendations based on objective criteria, rather than based on a subjective assessment.

C.

The auditor should explore alternative solutions to address the audit problem, so the audit client has options.

D.

The auditor should take a flexible position on the recommendations and focus on resolving the issue by addressing the interests of the people concerned.

IIA IIA-CIA-Part3-3P Premium Access
Questions 92

During the last year, an organization had an opening inventory of $300,000, purchases of $980,000, sales of $1,850,000, and a gross margin of 40 percent. What is the closing inventory if the periodic inventory system is used?

Options:
A.

$170,000

B.

$280,000

C.

$300,000

D.

$540,000

Questions 93

When granting third parties temporary access to an entity's computer systems, which of the following is the most effective control?

Options:
A.

Access is approved by the supervising manager.

B.

User accounts specify expiration dates and are based on services provided.

C.

Administrator access is provided for a limited period.

D.

User accounts are deleted when the work is completed.

Questions 94

When developing an effective risk-based plan to determine audit priorities, an internal audit activity should start by:

Options:
A.

Identifying risks to the organization's operations.

B.

Observing and analyzing controls.

C.

Prioritizing known risks.

D.

Reviewing organizational objectives.

Questions 95

A holding company set up a centralized group technology department, using a local area network with a mainframe computer to process accounting information for all companies within the group. An internal auditor would expect to find all of the following controls within the technology department except:

Options:
A.

Adequate segregation of duties between data processing controls and file security controls.

B.

Documented procedures for remote job entry and for local data file retention.

C.

Emergency and disaster recovery procedures and maintenance agreements in place to ensure continuity of operations.

D.

Established procedures to prevent and detect unauthorized changes to data files.

Questions 96

Which of the following statements is in accordance with COBIT?

1) Pervasive controls are general while detailed controls are specific.

2) Application controls are a subset of pervasive controls.

3) Implementation of software is a type of pervasive control.

4) Disaster recovery planning is a type of detailed control.

Options:
A.

1 and 4 only

B.

2 and 3 only

C.

2, 3, and 4 only

D.

1, 2, and 4 only

Questions 97

Which of the following methods, if used in conjunction with electronic data interchange (EDI), will improve the organization's cash management program, reduce transaction data input time and errors, and allow the organization to negotiate discounts with EDI vendors based on prompt payment?

Options:
A.

Electronic funds transfer.

B.

Knowledge-based systems.

C.

Biometrics.

D.

Standardized graphical user interface.

Questions 98

Which of the following statements is false regarding the internal audit approach when a set of standards other than The IIA's Standards is applicable to a specific engagement?

Options:
A.

The internal auditor may cite the use of other standards during audit communications.

B.

If the other standards are government-issued, the internal auditor should apply them in conjunction with The IIA's Standards.

C.

If there are inconsistencies between the other standards and The IIA's Standards, the internal auditor must use the more restrictive standards.

D.

If there are inconsistencies between the other standards and The IIA's Standards, the internal auditor must use the less restrictive standards.

Questions 99

Which of the following is not a method for implementing a new application system?

Options:
A.

Direct cutover.

B.

Parallel.

C.

Pilot.

D.

Test.

Questions 100

At what point during the systems development process should an internal auditor verify that the new application's connectivity to the organization's other systems has been established correctly?

Options:
A.

Prior to testing the new application.

B.

During testing of the new application.

C.

During implementation of the new application.

D.

During maintenance of the new application.