Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IIA CIA IIA-CIA-Part3 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following statements distinguishes a router from a typical switch?

Options:

A.

A router operates at layer two. while a switch operates at layer three of the open systems interconnection model.


B.

A router transmits data through frames, while a switch sends data through packets.


C.

A router connects networks, while a switch connects devices within a network.


D.

A router uses a media access control address during the transmission of data, whie a switch uses an internet protocol address.


Expert Solution
Questions # 47:

Which of the following describes the primary advantage of using data analytics in internal auditing?

Options:

A.

It helps support the internal audit conclusions with factual evidence.


B.

It reduces the time and effort needed to prepare the audit report.


C.

It helps prevent internal auditors from unknowingly disregarding key process risks.


D.

It enables internal auditors to meet their responsibility for monitoring controls.


Expert Solution
Questions # 48:

Which of the following physical access control is most likely to be based on ’’something you have" concept?

Options:

A.

A retina characteristics reader


B.

A P3M code reader


C.

A card-key scanner


D.

A fingerprint scanner


Expert Solution
Questions # 49:

Which of the following statements is most accurate concerning the management and audit of a web server?

Options:

A.

The file transfer protocol (FTP) should always be enabled


B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts


C.

The number of ports and protocols allowed to access the web server should be maximized


D.

Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP


Expert Solution
Questions # 50:

Which of the following controls would be most efficient to protect business data from corruption and errors?

Options:

A.

Controls to ensure data is unable to be accessed without authorization.


B.

Controls to calculate batch totals to identify an error before approval.


C.

Controls to encrypt the data so that corruption is likely ineffective.


D.

Controls to quickly identify malicious intrusion attempts.


Expert Solution
Questions # 51:

A motivational technique generally used to overcome monotony and job-related boredom is:

Options:

A.

Job specification.


B.

Job objectives.


C.

Job rotation.


D.

Job description.


Expert Solution
Questions # 52:

An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?

Options:

A.

Shoulder suiting


B.

Pharming,


C.

Phishing.


D.

Social engineering.


Expert Solution
Questions # 53:

Which observations should the chief audit executive include in the executive summary of the final engagement communication?

Options:

A.

All observations


B.

Only observations with an action plan


C.

Only significant observations


D.

Only observations agreed with management


Expert Solution
Questions # 54:

Employees of an organization noticed that an exterior surface of the office building was deteriorating. Upon investigation, it was found that the deterioration was caused by harsh cleaning chemicals used to remove excessive bird droppings, and that the birds were drawn to the building to feed from a spider infestation. Which of the following best represents a root cause-based recommendation for this situation?

Options:

A.

Repair the surface of the building


B.

Discontinue the use of the cleaning chemicals


C.

Scare the birds away by installing scarecrows


D.

Enhance cleaning of the building to displace spiders


Expert Solution
Questions # 55:

Which of the following would be most likely included in the internal audit procedures manual?

Options:

A.

The internal audit charter


B.

The annual audit plan


C.

The engagement results


D.

The quality assurance and improvement program


Expert Solution
Questions # 56:

An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?

Options:

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.


B.

Hackers breaching the organization's network to access research and development reports


C.

A denial-of-service attack that prevents access to the organization's website.


D.

A hacker accessing she financial information of the company


Expert Solution
Questions # 57:

An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC

resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?

Options:

A.

The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.


B.

Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.


C.

Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.


D.

Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.


Expert Solution
Questions # 58:

Which of the following statements is true regarding a project life cycle?

Options:

A.

Risk and uncertainty increase over the life of the project.


B.

Costs and staffing levels are typically high as the project draws to a close.


C.

Costs related to making changes increase as the project approaches completion.


D.

The project life cycle corresponds with the life cycle of the product produced by or modified by the project.


Expert Solution
Questions # 59:

Which of the following is a typical activity performed by the help desk?

Options:

A.

Monitoring the network


B.

Troubleshooting


C.

Backing up data


D.

Assigning authorizations to a user, a role, or profile


Expert Solution
Questions # 60:

A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?

Options:

A.

Compare to the annual cost of capital


B.

Compare to the annual interest data.


C.

Compare to the required rate of return.


D.

Compare to the net present value.


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions