Which of the following steps should an internal auditor complete when conducting a review of an electronic data interchange application provided by a third-party service?
1.Ensure encryption keys meet ISO standards.
2.Determine whether an independent review of the service provider's operation has been conducted.
3.Verify that the service provider's contracts include necessary clauses.
4.Verify that only public-switched data networks are used by the service provider
Applying ISO 31000; which of the following is part of the external context for risk management?
Which of the following would be considered a violation of The IIA’s mandatory guidance on independence?
According to IIA guidance, which of the following activities are typically primary objectives of engagement supervision?
An engagement supervisor obtains facilities maintenance reports from a contractor during an audit of third-party services. Which of the following is the source of authority for the engagement supervisor to make such contact outside the organization?
When reviewing workpapers, engagement supervisors may ask for additional evidence or clarification via review notes. According to IIA guidance, which of the following statements is true regarding the engagement supervisors review notes?
According to IIA guidance, which of the following statements is true regarding engagement planning?
Which of the following statements best describes the difference between risk appetite and risk tolerance?
An internal auditor believes that the internal audit activity's independence is impaired Which of the following actions should the internal auditor take first?
Which of the following is the most appropriate way to ensure that a newly formed internal audit activity remains free from undue influence by management?