Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IIA CIA IIA-CIA-Part3 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?

Options:

A.

Use of a central processing unit


B.

Use of a database management system


C.

Use of a local area network


D.

Use of electronic data Interchange


Expert Solution
Questions # 77:

An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?

Options:

A.

Cost of sales increased relative to sales.


B.

Total sales increased relative to expenses.


C.

The organization had a higher dividend payout rate in year two.


D.

The government increased the corporate tax rate


Expert Solution
Questions # 78:

An organization selected a differentiation strategy to compete at the business level. Which of the following structures best fits this strategic choice?

Options:

A.

Functional structure.


B.

Divisional structure.


C.

Mechanistic structure.


D.

Functional structure with cross-functional teams.


Expert Solution
Questions # 79:

An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?

Options:

A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data


B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process


C.

Institute detection and authentication controls for all devices used for network connectivity and data storage


D.

Use management software to scan and then prompt patch reminders when devices connect to the network


Expert Solution
Questions # 80:

An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?

Options:

A.

Data analysis.


B.

Data diagnostics.


C.

Data velocity.


D.

Data normalization.


Expert Solution
Questions # 81:

A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software that will remotely wipe data in case of theft or other incidents. Which of the following should the organization ensure in exchange for the employees' consent?

Options:

A.

That those employees who do not consent to MDM software cannot have an email account.


B.

That personal data on the device cannot be accessed and deleted by system administrators.


C.

That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.


D.

That employee consent includes appropriate waivers regarding potential breaches to their privacy.


Expert Solution
Questions # 82:

During an audit of the payroll system, the internal auditor identifies and documents the following condition:

"Once a user is logged into the system, the user has access to all functionality within the system."

What is the most likely root cause for tins issue?

Options:

A.

The authentication process relies on a simple password only, which is a weak method of authorization.


B.

The system authorization of the user does not correctly reflect the access rights intended.


C.

There was no periodic review to validate access rights.


D.

The application owner apparently did not approve the access request during the provisioning process.


Expert Solution
Questions # 83:

Which of the following describes a mechanistic organizational structure?

Options:

A.

Primary direction of communication tends to be lateral.


B.

Definition of assigned tasks tends to be broad and general.


C.

Type of knowledge required tends to be broad and professional.


D.

Reliance on self-control tends to be low.


Expert Solution
Questions # 84:

During which phase of the contracting process ere contracts drafted for a proposed business activity?

Options:

A.

Initiation phase.


B.

Bidding phase


C.

Development phase


D.

Management phase


Expert Solution
Questions # 85:

Which of the following responsibilities would ordinarily fall under the help desk function of an organization?

Options:

A.

Maintenance service items such as production support


B.

Management of infrastructure services, including network management


C.

Physical hosting of mainframes and distributed servers


D.

End-to-end security architecture design


Expert Solution
Questions # 86:

What is the primary purpose of an integrity control?

Options:

A.

To ensure data processing is complete, accurate, and authorized


B.

To ensure data being processed remains consistent and intact


C.

To monitor the effectiveness of other controls


D.

To ensure the output aligns with the intended result


Expert Solution
Questions # 87:

Which of the following is classified as a product cost using the variable costing method?

1. Direct labor costs.

2. Insurance on a factory.

3. Manufacturing supplies.

4. Packaging and shipping costa.

Options:

A.

1 and 2


B.

1 and 3


C.

2 and 4


D.

3 and 4


Expert Solution
Questions # 88:

Which of the following statements. Is most accurate concerning the management and audit of a web server?

Options:

A.

The file transfer protocol (FTP) should always be enabled.


B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.


C.

The number of ports and protocols allowed to access the web server should be maximized.


D.

Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.


Expert Solution
Questions # 89:

According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?

Options:

A.

Relationship with supervisor


B.

Salary


C.

Security.


D.

Achievement


Expert Solution
Questions # 90:

Which of the following principles s shared by both hierarchies and open organizational structures?

1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.

2. A supervisor's span of control should not exceed seven subordinates.

3. Responsibility should be accompanied by adequate authority.

4. Employees at all levels should be empowered to make decisions.

Options:

A.

1 and 3 only


B.

1 and 4 only


C.

2 and 3 only


D.

3 and 4 only


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions