Pass the IIA CIA IIA-CIA-Part3 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?

Options:

A.

Face or finger recognition equipment,


B.

Radio-frequency identification chips to authenticate employees with cards.


C.

A requirement to clock in and clock out with a unique personal identification number.


D.

A combination of a smart card and a password to clock in and clock out.


Expert Solution
Questions # 77:

Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?

Options:

A.

Anti-malware software


B.

Authentication


C.

Spyware


D.

Rooting


Expert Solution
Questions # 78:

An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?

Options:

A.

The auditor is normalizing data in preparation for analyzing it.


B.

The auditor is analyzing the data in preparation for communicating the results,


C.

The auditor is cleaning the data in preparation for determining which processes may be involves .


D.

The auditor is reviewing trio data prior to defining the question


Expert Solution
Questions # 79:

According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

Options:

A.

The business continuity management charter.


B.

The business continuity risk assessment plan.


C.

The business Impact analysis plan


D.

The business case for business continuity planning


Expert Solution
Questions # 80:

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

Options:

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.


B.

Review the password length, frequency of change, and list of users for the workstation's login process.


C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.


D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity


Expert Solution
Questions # 81:

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

Options:

A.

Higher cash flow and treasury balances.


B.

Higher inventory balances


C.

Higher accounts receivable.


D.

Higher accounts payable


Expert Solution
Questions # 82:

Which of the following should be included in a data privacy poky?

1. Stipulations for deleting certain data after a specified period of time.

2. Guidance on acceptable methods for collecting personal data.

3. A requirement to retain personal data indefinitely to ensure a complete audit trail,

4. A description of what constitutes appropriate use of personal data.

Options:

A.

1 and 2 only


B.

2 and 3 only


C.

1, 2 and 4 only


D.

2, 3, and 4 only


Expert Solution
Questions # 83:

During which phase of the contracting process ere contracts drafted for a proposed business activity?

Options:

A.

Initiation phase.


B.

Bidding phase


C.

Development phase


D.

Management phase


Expert Solution
Questions # 84:

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?

Options:

A.

A just-in-time purchasing environment


B.

A Large volume of custom purchases


C.

A variable volume sensitive to material cost


D.

A currently inefficient purchasing process


Expert Solution
Questions # 85:

An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?

Options:

A.

The capital accounts of the partners should be increased by she original cost of the contributed equipment.


B.

The capital accounts should be increased using a weighted average based by the current percentage of ownership.


C.

No action is needed, as the capital account of each partner was increased by the correct amount,


D.

The capital accounts of the partners should be increased by She fair market value of their contribution.


Expert Solution
Questions # 86:

An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal

Auditor be most concerned about?

Options:

A.

Compliance.


B.

Privacy


C.

Strategic


D.

Physical security


Expert Solution
Questions # 87:

An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.

Which of the following terms would the investor most likely label this investment in her portfolio?

Options:

A.

A star


B.

A cash cow


C.

A question mark


D.

A dog


Expert Solution
Questions # 88:

Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?

Options:

A.

Verify completeness and accuracy.


B.

Verify existence and accuracy.


C.

Verify completeness and integrity.


D.

Verify existence and completeness.


Expert Solution
Questions # 89:

An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?

Options:

A.

It is particularly helpful to management when the organization is facing rapid change.


B.

It is a more successful approach when adopted by mechanistic organizations.


C.

It is mere successful when goal setting is performed not only by management, but by all team members, including lower-level staff.


D.

It is particularly successful in environments that are prone to having poor employer-employee relations.


Expert Solution
Questions # 90:

Which of the following is an example of a physical control?

Options:

A.

Providing fire detection and suppression equipment


B.

Establishing a physical security policy and promoting it throughout the organization


C.

Performing business continuity and disaster recovery planning


D.

Keeping an offsite backup of the organization's critical data


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions