In accounting, which of the following statements is true regarding the terms debit and credit?
Which of the following best describes a man-in-the-middle cyber-attack?
Which of the following Issues would be a major concern for internal auditors when using a free software to analyze a third-party vendor's big data?
Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?
An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?
A organization finalized a contract in which a vendor is expected to design, procure, and construct a power substation for $3,000,000. In this scenario, the organization agreed to which of the following types of contracts?
Which of the following IT disaster recovery plans includes a remote site designated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?
The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?
A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?
According to IIA guidance, which of the following statements is true regarding penetration testing?
Which of the following can be classified as debt investments?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
IIA Free Exams |
---|
![]() |