Pass the IIA CIA IIA-CIA-Part3-3P Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions
Questions # 71:

If legal or regulatory standards prohibit conformance with certain parts of The IIA's Standards, the auditor should do which of the following?

Options:

A.

Conform with all other parts of The IIA's Standards and provide appropriate disclosures.


B.

Conform with all other parts of The IIA's Standards; there is no need to provide appropriate disclosures.


C.

Continue the engagement without conforming with the other parts of The IIA's Standards.


D.

Withdraw from the engagement.


Questions # 72:

An internationally recognized brand name is an entrance barrier to new competitors because new competitors would:

Options:

A.

Have to initiate a price war in order to enter the industry.


B.

Face increased production costs.


C.

Face increased marketing costs.


D.

Face higher learning costs, which would increase fixed costs.


Questions # 73:

Which of the following would best prevent unauthorized external changes to an organization's data?

Options:

A.

Antivirus software, firewall, data encryption.


B.

Firewall, data encryption, backup procedures.


C.

Antivirus software, firewall, backup procedures.


D.

Antivirus software, data encryption, change logs.


Questions # 74:

In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners.

Which of the following network types is illustrated by this scenario?

Options:

A.

A value-added network.


B.

A local area network.


C.

A metropolitan area network.


D.

A wide area network.


Questions # 75:

Which of the following is the best example of IT governance controls?

Options:

A.

Controls that focus on segregation of duties, financial and change management


B.

Personnel policies that define and enforce conditions for staff in sensitive IT areas


C.

Standards that support IT policies by more specifically defining required actions


D.

Controls that focus on data structures and the minimum level of documentation required


Questions # 76:

Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?

Options:

A.

Data center operations manager.


B.

Response and support team.


C.

Database administrator.


D.

Network administrator.


Questions # 77:

An internal audit manager is explaining to a newly hired staff auditor the various analytics techniques frequently used by the internal audit activity Which of the following statements is true regarding these analytics techniques?

Options:

A.

Process mining is a type of data analysts where the data subject is a process


B.

Process analysis is a type of data mining where the data subject is a designated area of a process


C.

Data mining is a type of data analysis that focuses on finding statistical relationships in order to create

profiles


D.

Data mining involves examining small amounts of structured data in a systematic manner


Questions # 78:

Which of the following types of analytics focuses less on analysis and more on condensing data into mote meaningful pieces of information?

Options:

A.

Diagnostic analytics


B.

Descriptive analytics


C.

Prescriptive analytics


D.

Predictive analytics


Questions # 79:

New data privacy laws require an organization to use collected customer information for me sole purpose of meeting the organization's business requirements. Which of the following best addresses the risk of the organization not complying with this objective?

Options:

A.

Provide training on social engineering attacks


B.

Encrypt the customer information retained by the organization


C.

Establish policies that discipline those who misuse customer information


D.

Allocate access profiles for each end user of the information


Questions # 80:

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

Options:

A.

Rooting.


B.

Eavesdropping.


C.

Man in the middle.


D.

Session hijacking.


Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions