Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free IIA IIA-CIA-Part3 Practice Exam with Questions & Answers | Set: 4

Questions 46

Which of the following statements depicts a valid role of the internal audit function in ensuring the effectiveness of management action plans?

Options:
A.

Internal audit should not be involved in the design, implementation, or monitoring of management action plans in order to maintain independence and objectivity

B.

Internal audit supports the board in the design, implementation, and monitoring of effective management action plans

C.

Internal audit collaborates with management to evaluate whether the management action plans remediate audit observations effectively

D.

Internal audit designs the action plans and ensures that management implements them effectively

IIA IIA-CIA-Part3 Premium Access
Questions 47

Senior management of a dairy organization asks the internal audit function to undertake an advisory service within the finance function and the internal audit function subsequently issues a report. Which of the following is aligned with IIA guidance on monitoring the results of such an engagement?

Options:
A.

Senior management should dedicate a team to carry out a follow-up audit

B.

A member of the finance function should undertake follow-up in line with the scope

C.

Follow-up on the outcome of advisory services is not required

D.

The internal audit function should agree with senior management on the scope of a follow-up

Questions 48

A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:

“Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.” The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?

Options:
A.

A risk of spyware and malware.

B.

A risk of corporate espionage.

C.

A ransomware attack risk.

D.

A social engineering risk.

Questions 49

In a final audit report, internal auditors drafted the following management action plan with a due date of the last day of the calendar year:

"Plan: A bank reconciliation template has been updated to address issues with formulas incorrectly calculating variances."

Which critical element of the action plan is missing?

Options:
A.

The responsible personnel

B.

The status of the action plan

C.

A referral to the policy or procedure

D.

The level of risk

Questions 50

Which of the following is an example of a phishing attack?

Options:
A.

An organization’s website becomes flooded with malicious traffic on the first day of the online shopping season, causing the website to crash and preventing customers from purchasing deals online

B.

The employees of a retail organization responded to emails with a link to malware that enabled a hacker to access the point-of-sale system and obtain customers’ credit card information

C.

An organization’s employees clicked on a link that allowed a worm to infiltrate and encrypt the organization’s operating system, rendering it unusable. A group of hackers is demanding payment to unlock the encryption

D.

A group of online activists hacked into the private email and confidential records of the local police department and released the information online to expose the corrupt practices of the department

Questions 51

Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?

Options:
A.

Predictive analytics

B.

Prescriptive analytics

C.

Descriptive analytics

D.

Diagnostic analytics

Questions 52

An organization has 1,000 units of a defective item in stock. Per unit, market price is $10; production cost is $4; and the defect selling price is $5. What is the carrying amount (inventory value) of defects at year-end?

Options:
A.

$0

B.

$4,000

C.

$5,000

D.

$10,000

Questions 53

Which of the following is improved by the use of smart devices?

Options:
A.

Version control

B.

Privacy

C.

Portability

D.

Secure authentication

Questions 54

An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?

Options:
A.

Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters

B.

Orders, commands, and advice are sent to the subsidiaries from headquarters

C.

People of local nationality are developed for the best positions within their own country

D.

There is a significant amount of collaboration between headquarters and subsidiaries

Questions 55

Which of the following are the most common characteristics of big data?

Options:
A.

Visibility, validity, vulnerability

B.

Velocity, variety, volume

C.

Complexity, completeness, constancy

D.

Continuity, control, convenience

Questions 56

Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?

Options:
A.

Gain sharing

B.

Commission

C.

Profit sharing

D.

Pension

Questions 57

Which of the following describes the primary advantage of using data analytics in internal auditing?

Options:
A.

It helps support the internal audit conclusions with factual evidence.

B.

It reduces the time and effort needed to prepare the audit report.

C.

It helps prevent internal auditors from unknowingly disregarding key process risks.

D.

It enables internal auditors to meet their responsibility for monitoring controls.

Questions 58

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

Options:
A.

An extranet.

B.

A local area network (LAN).

C.

An intranet.

D.

The internet.

Questions 59

According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

Options:
A.

The business continuity management charter

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Questions 60

IT governance begins with which of the following activities?

Options:
A.

Identification of risk-mitigating options.

B.

Definition of IT objectives.

C.

Identification of IT risk events.

D.

Definition of risk response policies.