Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the IIA CIA IIA-CIA-Part3 Questions and answers with Dumpstech

Exam IIA-CIA-Part3 Premium Access

View all detail and faqs for the IIA-CIA-Part3 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following would be most likely found in an internal audit procedures manual?

Options:

A.

A summary of the strategic plan of the area under review

B.

Appropriate response options for when findings are disputed by management

C.

An explanation of the resources needed for each engagement

D.

The extent of the auditor's authority to collect data from management

Questions # 17:

The budgeted cost of work performed is a metric best used to measure which project management activity?

Options:

A.

Resource planning.

B.

Cost estimating

C.

Cost budgeting.

D.

Cost control.

Questions # 18:

During the second half of the audit year, the chief audit executive (CAE) identified significant negative variances to the approved audit budget required to complete the internal audit plan. Which of the following actions should the CAE take?

Options:

A.

Revise the internal audit plan to reduce coverage of new strategic critical areas so that the approved budget can be met

B.

Reduce the scope of the remainder of the engagements in the internal audit plan to reduce overall costs

C.

Communicate to senior management and the board the risk of not being able to complete the audit plan

D.

Continue to complete the plan regardless of the budget variances, as the audit function is invaluable to sound corporate governance

Questions # 19:

Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?

Options:

A.

Requested backup tapes were not returned from the offsite vendor In a timely manner.

B.

Returned backup tapes from the offsite vendor contained empty spaces.

C.

Critical systems have boon backed up more frequently than required.

D.

Critical system backup tapes are taken off site less frequently than required

Questions # 20:

An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;

- Risks specific to the organization itself.

- Risks specific to the service provider.

- Risks shared by both the organization and the service provider

Which of the following risks should the auditor classify as specific to the service provider?

Options:

A.

Unexpected increases in outsourcing costs.

B.

Loss of data privacy.

C.

Inadequate staffing.

D.

Violation of contractual terms.

Questions # 21:

Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?

Options:

A.

Theory of constraints.

B.

Just-in-time method.

C.

Activity-based costing.

D.

Break-even analysis

Questions # 22:

The manager of the sales department wants to Increase the organization's net profit margin by 7% (from 43% in the prior year to 50% in the current year). Given the information provided in the table below, what would be the targeted sales amount for the current year?

Question # 22

Options:

A.

$20,000,000

B.

$24.500.000

C.

$30.000.000

D.

$35.200.000

Questions # 23:

A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?

Options:

A.

The company's code of ethics.

B.

The third-party management risk register.

C.

The signed service-level agreement.

D.

The subcontractors' annual satisfaction survey.

Questions # 24:

Which of the following physical access controls is most likely to be based on the "something you have" concept?

Options:

A.

A retina characteristics reader.

B.

A PIN code reader.

C.

A card-key scanner.

D.

A fingerprint scanner.

Questions # 25:

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?

Options:

A.

Not installing anti-malware software.

B.

Updating operating software in a haphazard manner.

C.

Applying a weak password for access to a mobile device.

D.

Jailbreaking a locked smart device.

Questions # 26:

An internal auditor has finalized an engagement of the vendor master file. The results of the current engagement do not differ significantly from that of last year, in which several significant weaknesses in internal controls were reported. The internal auditor states in the final communication that the internal controls are as effective as that of the previous year. Which of the following elements of quality of communication could be improved?

Options:

A.

Conciseness

B.

Constructiveness

C.

Objectivity

D.

Accuracy

Questions # 27:

An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?

Options:

A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data

B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process

C.

Institute detection and authentication controls for all devices used for network connectivity and data storage

D.

Use management software to scan and then prompt patch reminders when devices connect to the network

Questions # 28:

The management of working capital is most crucial for which of the following aspects of business?

Options:

A.

Liquidity

B.

Profitability

C.

Solvency

D.

Efficiency

Questions # 29:

Which of the following is an effective preventive control for data center security?

Options:

A.

Motion detectors.

B.

Key card access to the facility.

C.

Security cameras.

D.

Monitoring access to data center workstations

Questions # 30:

According to IIA guidance on IT, which of the following best describes a logical access control?

Options:

A.

Require complex passwords to be established and changed quarterly

B.

Require swipe cards to control entry into secure data centers.

C.

Monitor access to the data center with closed circuit camera surveillance.

D.

Maintain current role definitions to ensure appropriate segregation of duties

Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions