Pass the IIA CIA IIA-CIA-Part3 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?

Options:

A.

Managerial accounting uses double-entry accounting and cost data.


B.

Managerial accounting uses general accepted accounting principles.


C.

Managerial accounting involves decision making based on quantifiable economic events.


D.

Managerial accounting involves decision making based on predetermined standards.


Expert Solution
Questions # 42:

Which of the following is an indicator of liquidity that is more dependable than working capital?

Options:

A.

Acid-test (quick) ratio


B.

Average collection period


C.

Current ratio.


D.

Inventory turnover.


Expert Solution
Questions # 43:

According to IIA guidance on IT, which of the following best describes a logical access control?

Options:

A.

Require complex passwords to be established and changed quarterly


B.

Require swipe cards to control entry into secure data centers.


C.

Monitor access to the data center with closed circuit camera surveillance.


D.

Maintain current role definitions to ensure appropriate segregation of duties


Expert Solution
Questions # 44:

The budgeted cost of work performed is a metric best used to measure which project management activity?

Options:

A.

Resource planning.


B.

Cost estimating


C.

Cost budgeting.


D.

Cost control.


Expert Solution
Questions # 45:

An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?

Options:

A.

Required documentation of process for discontinuing use of the devices


B.

Required removal of personal pictures and contacts.


C.

Required documentation of expiration of contract with service provider.


D.

Required sign-off on conflict of interest statement.


Expert Solution
Questions # 46:

Which of the following sites would an Internet service provider most likely use to restore operations after its servers were damaged by a natural disaster?

Options:

A.

On site.


B.

Cold site.


C.

Hot site.


D.

Warm site


Expert Solution
Questions # 47:

An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?

Options:

A.

The organization will be unable to develop preventative actions based on analytics.


B.

The organization will not be able to trace and monitor the activities of database administers.


C.

The organization will be unable to determine why intrusions and cyber incidents took place.


D.

The organization will be unable to upgrade the system to newer versions.


Expert Solution
Questions # 48:

An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?

Options:

A.

The organizational chart shows only formal relationships.


B.

The organizational chart shows only the line of authority.


C.

The organizational chart shows only the senior management positions.


D.

The organizational chart is irrelevant when testing the control environment.


Expert Solution
Questions # 49:

Which of the following is an example of a physical control designed to prevent security breaches?

Options:

A.

Preventing database administrators from initiating program changes


B.

Blocking technicians from getting into the network room.


C.

Restricting system programmers' access to database facilities


D.

Using encryption for data transmitted over the public internet


Expert Solution
Questions # 50:

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?

Options:

A.

Phishing.


B.

Ransomware.


C.

Hacking.


D.

Makvare


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions