Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free IIA IIA-CIA-Part3 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?

Options:
A.

Warm site recovery plan.

B.

Hot site recovery plan.

C.

Cool site recovery plan.

D.

Cold site recovery plan.

IIA IIA-CIA-Part3 Premium Access
Questions 12

Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?

Options:
A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Questions 13

How do data analysis technologies affect internal audit testing?

Options:
A.

They improve the effectiveness of spot check testing techniques

B.

They allow greater insight into high-risk areas

C.

They reduce the overall scope of the audit engagement

D.

They increase the internal auditor’s objectivity

Questions 14

Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?

Options:
A.

Voice recognition and token

B.

Password and fingerprint

C.

Fingerprint and voice recognition

D.

Password and token

Questions 15

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:
A.

Direct product costs

B.

Indirect costs

C.

Direct period costs

D.

Indirect period costs

Questions 16

Which of the following IT-related activities is most commonly performed by the second line of defense?

Options:
A.

Block unauthorized traffic.

B.

Encrypt data.

C.

Review disaster recovery test results.

D.

Provide an independent assessment of IT security.

Questions 17

What is the primary purpose of an integrity control?

Options:
A.

To ensure data processing is complete, accurate, and authorized

B.

To ensure data being processed remains consistent and intact

C.

To monitor the effectiveness of other controls

D.

To ensure the output aligns with the intended result

Questions 18

While conducting' audit procedures at the organization's data center an internal auditor noticed the following:

- Backup media was located on data center shelves.

- Backup media was organized by date.

- Backup schedule was one week in duration.

The system administrator was able to present restore logs.

Which of the following is reasonable for the internal auditor to conclude?

Options:
A.

Backup media is not properly stored, as the storage facility should be off-site.

B.

Backup procedures are adequate and appropriate according to best practices.

C.

Backup media is not properly indexed, as backup media should be indexed by system, not date.

D.

Backup schedule is not sufficient, as full backup should be conducted daily.

Questions 19

According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?

Options:
A.

A revenue calculation spreadsheet supported with price and volume reports from the production department.

B.

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions.

C.

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantities.

D.

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances

Questions 20

Which of the following storage options would give the organization the best chance of recovering data?

Options:
A.

Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.

B.

Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.

C.

Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.

D.

Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.