Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IIA CIA IIA-CIA-Part3 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?

Options:

A.

Risk tolerance


B.

Performance


C.

Threats and opportunities


D.

Governance


Expert Solution
Questions # 122:

Which of the following documents would provide an internal auditor with information on the length of time to maintain documents after the completion of an engagement?

Options:

A.

Internal audit charter


B.

Annual internal audit plan


C.

Internal audit policies


D.

Quality assurance and improvement program


Expert Solution
Questions # 123:

During an internal audit engagement, it was found that several vendors were on a government sanctions list and must no longer be traded with. Which of the following would most effectively mitigate the risk of noncompliance with sanctions lists that are updated regularly?

Options:

A.

Agreements with sanctioned vendors discovered by internal audit will be placed on hold until further notice from the government


B.

A new procedure of vendor onboarding will be implemented to ensure that all new vendors undergo screenings against the sanctions list


C.

Controls will be embedded in the vendor management processes to ensure that new and existing vendors are compliant with changes to the sanctions list


D.

The legal team will be asked to prepare counter arguments to dispute audit findings and potential inquiries from the governmental authority


Expert Solution
Questions # 124:

A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?

Options:

A.

Fixed maintenance costs.


B.

Variable maintenance costs.


C.

Mixed maintenance costs.


D.

Indirect maintenance costs.


Expert Solution
Questions # 125:

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?

Options:

A.

Not installing anti-malware software


B.

Updating operating software in a haphazard manner,


C.

Applying a weak password for access to a mobile device.


D.

JoIIbreaking a locked smart device


Expert Solution
Questions # 126:

The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?

Options:

A.

Beginning inventory was overstated for the year.


B.

Cost of goods sold was understated for the year.


C.

Ending inventory was understated for the year.


D.

Cost of goods sold was overstated for the year.


Expert Solution
Questions # 127:

An internal auditor discovered that the organization was not in full compliance with a regulatory labeling requirement for one of its products. The responsible manager indicated that the current product labeling has been in use for several years without any problems. If discovered, this regulatory breach could result in significant fines for the organization. What should be the chief audit executive's next course of action?

Options:

A.

Discuss the matter with the CEO and other senior management


B.

Recommend that disciplinary action be taken against the manager for exposing the company to such risk


C.

Communicate to the board the current situation, including the risk exposure to the company


D.

Take on the initiative of implementing corrective actions to mitigate the identified risks


Expert Solution
Questions # 128:

Which of the following is a characteristic of big data?

Options:

A.

Big data is being generated slowly due to volume.


B.

Big data must be relevant for the purposes of organizations.


C.

Big data comes from a single type of formal.


D.

Big data is always changing


Expert Solution
Questions # 129:

Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?

Options:

A.

Gain sharing


B.

Commission


C.

Profit sharing


D.

Pension


Expert Solution
Questions # 130:

According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?

Options:

A.

A revenue calculation spreadsheet supported with price and volume reports from the production department.


B.

An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions.


C.

An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantities.


D.

An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances


Expert Solution
Questions # 131:

Which of the following best describes owner's equity?

Options:

A.

Assets minus liabilities.


B.

Total assets.


C.

Total liabilities.


D.

Owners contribution plus drawings.


Expert Solution
Questions # 132:

The manager of the sales department wants to Increase the organization's net profit margin by 7% (from 43% in the prior year to 50% in the current year). Given the information provided in the table below, what would be the targeted sales amount for the current year?

Question # 132

Options:

A.

$20,000,000


B.

$24.500.000


C.

$30.000.000


D.

$35.200.000


Expert Solution
Questions # 133:

Which of the following IT-related activities is most commonly performed by the second line of defense?

Options:

A.

Block unauthorized traffic.


B.

Encrypt data.


C.

Review disaster recovery test results.


D.

Provide independent assessment of IT security.


Expert Solution
Questions # 134:

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?

Options:

A.

Not installing anti-malware software.


B.

Updating operating software in a haphazard manner.


C.

Applying a weak password for access to a mobile device.


D.

Jailbreaking a locked smart device.


Expert Solution
Questions # 135:

An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?

Options:

A.

Face or finger recognition equipment,


B.

Radio-frequency identification chips to authenticate employees with cards.


C.

A requirement to clock in and clock out with a unique personal identification number.


D.

A combination of a smart card and a password to clock in and clock out.


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions