An internal auditor wants to test the processing logic of a computer application during a specific period to ensure consistent processing of transactions. Which of the following is the best approach to achieve the objective of the test?
An internal auditor is conducting a preliminary survey of the investments area, and sends an internal control questionnaire to the management of the function. (An extract of the survey is provided below).
1. Are there any restrictions for any company's investments?
2. Are there any written policies and procedures that document the flow of investment processing?
3. Are investment purchases recorded in the general ledger on the date traded?
4. Is the documentation easily accessible to an persons who need in to perform their job?
Which of the following is a drawback of testing methods like this?
The head of customer service asked the chief audit executive (CAE) whether internal auditors could assist her staff with conducting a risk self-assessment in the customer service department The CAE promised to meet with customer service managers analyze relevant business processes and come up with a proposal Who is most likely to be the final approver of the engagement objectives and scope?
A technology organization is developing an artificial intelligence (AI) program for use on its social media platform. The AI program is meant to help content creators with images and posts that will acquire followers more efficiently. The internal audit function is planning an engagement of the AI program development. Which of the following should be considered a significant, immediate, and inherent risk?
Which requirement should the chief audit executive consider when communicating results of the quality assurance and improvement program to the board of a large organization?
According to the theory of constraints, which of the following is most influenced by various bottlenecks the organization encounters?
Which of the following is the next step in understanding a business process once an internal auditor has identified the process?
Which of the following risk assessment approaches involves gathering data from work team representing different levels of an organisation?
Which of the following is a primary reason for an internal auditor to use a risk and control questionnaire when auditing financial processes?
An electric utility provider measures working time spent on processing grid connection applications, response time for electricity outages, and the call center queuing time. Which of the following criteria would better suit a customer-oriented provider for measurement?
A large retail organization, which sells most of its products online, experiences a computer hacking incident. The chief IT officer immediately investigates the incident and concludes that the attempt was not successful. The chief audit executive (CAE) learns of the attack in a casual conversation with an IT auditor. Which of the following actions should the CAE take?
1. Meet with the chief IT officer to discuss the report and control improvements that will be implemented as a result of the security breach, if any.
2. Immediately inform the chair of the audit committee of the security breach, because thus far only the chief IT officer is aware of the incident.
3. Meet with the IT auditor to develop an appropriate audit program to review the organization's Internet-based sales process and key controls.
4. Include the incident in the next quarterly report to the audit committee.
An audit reveals that a manager's spouse is receiving paychecks, but is not employed by the organization. According to IIA guidance, which of the following actions should the internal auditor take?
Which of the following is the primary reason to develop an audit work program?
During a consulting engagement an internal auditor wants to determine whether all principal stakeholders are involved in a project. Which tool should the auditor use?
Which of the following statements accurately describes the Standards requirement for ret internal audit records?