Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free IIA IIA-CIA-Part3 Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?

Options:
A.

Cost method.

B.

Equity method .

C.

Consolidation method.

D.

Fair value method.

IIA IIA-CIA-Part3 Premium Access
Questions 22

Which of the following would most likely serve as a foundation for individual operational goats?

Options:
A.

Individual skills and capabilities.

B.

Alignment with organizational strategy.

C.

Financial and human resources of the unit.

D.

Targets of key performance indicators

Questions 23

Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?

Options:
A.

A list of trustworthy, good traffic and a list of unauthorized, blocked traffic.

B.

Monitoring for vulnerabilities based on industry intelligence.

C.

Comprehensive service level agreements with vendors.

D.

Firewall and other network perimeter protection tools.

Questions 24

An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?

Options:
A.

Estimate time required to complete the whole project.

B.

Determine the responses to expected project risks.

C.

Break the project into manageable components.

D.

Identify resources needed to complete the project

Questions 25

Which of the following is a sound network configuration practice to enhance information security?

Options:
A.

Change management practices to ensure operating system patch documentation is retained.

B.

User role requirements are documented in accordance with appropriate application-level control needs.

C.

Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.

D.

Interfaces reinforce segregation of duties between operations administration and database development.

Questions 26

Which of the following activities best illustrates a user's authentication control?

Options:
A.

Identity requests are approved in two steps.

B.

Logs are checked for misaligned identities and access rights.

C.

Users have to validate their identity with a smart card.

D.

Functions can toe performed based on access rights

Questions 27

Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and

telecommunications, but does not have servers or infrastructure equipment?

Options:
A.

Frozen site

B.

Cold site

C.

Warm site

D.

Hot site

Questions 28

When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?

Options:
A.

Whether every call that the service provider received was logged by the help desk.

B.

Whether a unique identification number was assigned to each issue identified by the service provider

C.

Whether the service provider used its own facilities to provide help desk services

D.

Whether the provider's responses and resolutions were well defined according to the service-level agreement.

Questions 29

In light of increasing emission taxes in the European Union, a car manufacturer introduced a new middle-class hybrid vehicle specifically for the European market only. Which of the following competitive strategies has the manufacturer used?

Options:
A.

Reactive strategy.

B.

Cost leadership strategy.

C.

Differentiation strategy.

D.

Focus strategy

Questions 30

Which of the following describes a third-party network that connects an organization specifically with its trading partners?

Options:
A.

Value-added network (VAN).

B.

Local area network (LAN).

C.

Metropolitan area network (MAN).

D.

Wide area network (WAN).