Pass the IIA CIA IIA-CIA-Part3 Questions and answers with CertsForce

Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions
Questions # 11:

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

Options:

A.

Direct product costs


B.

Indirect costs


C.

Direct period costs


D.

Indirect period costs


Expert Solution
Questions # 12:

Which of the following are the most common characteristics of big data?

Options:

A.

Visibility, validity, vulnerability


B.

Velocity, variety, volume


C.

Complexity, completeness, constancy


D.

Continuity, control, convenience


Expert Solution
Questions # 13:

An organization has 1,000 units of a defective item in stock. Per unit, market price is $10; production cost is $4; and the defect selling price is $5. What is the carrying amount (inventory value) of defects at year-end?

Options:

A.

$0


B.

$4,000


C.

$5,000


D.

$10,000


Expert Solution
Questions # 14:

Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?

Options:

A.

Authorization


B.

Architecture model


C.

Firewall


D.

Virtual private network


Expert Solution
Questions # 15:

Which of the following is classified as a product cost using the variable costing method?

Direct labor costs.

Insurance on a factory.

Manufacturing supplies.

Packaging and shipping costs.

Options:

A.

1 and 2


B.

1 and 3


C.

2 and 4


D.

3 and 4


Expert Solution
Questions # 16:

According to IIA guidance, which of the following are typical physical and environmental IT controls?

Options:

A.

Locating servers in locked rooms with restricted admission.


B.

Applying encryption where confidentiality is a stated requirement.


C.

Allocating and controlling access rights according to the organization's stated policy.


D.

Ensuring a tightly controlled process for applying all changes and patches to software, systems, network components, and data.


Expert Solution
Questions # 17:

Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?

Options:

A.

A traditional key lock.


B.

A biometric device.


C.

A card-key system.


D.

A proximity device.


Expert Solution
Questions # 18:

Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?

Options:

A.

Remote wipe.


B.

Software encryption.


C.

Device encryption.


D.

Authentication.


Expert Solution
Questions # 19:

Which of the following IT-related activities is most commonly performed by the second line of defense?

Options:

A.

Block unauthorized traffic.


B.

Encrypt data.


C.

Review disaster recovery test results.


D.

Provide an independent assessment of IT security.


Expert Solution
Questions # 20:

Which of the following physical access controls is most likely to be based on the "something you have" concept?

Options:

A.

A retina characteristics reader.


B.

A PIN code reader.


C.

A card-key scanner.


D.

A fingerprint scanner.


Expert Solution
Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions