110 likes | 111 Views
PassQuestion provides Free & Latest IIA-CIA-Part3 Questions and Answers which cover the list of new objectives to help you understand the topics and practice real questions and answers to ensure you pass your exam successfully in your first try.
E N D
IIA-CIA-Part3 Free Questions IIA-CIA-Part3 Free Questions CIA Exam Part Three: Business Knowledge for CIA Exam Part Three: Business Knowledge for Internal Auditing Internal Auditing https://www.passquestion.com/ https://www.passquestion.com/IIA-CIA-Part3 IIA-CIA-Part3.html .html
Question 1 Question 1 Technological uncertainty, subsidy, and spin-offs are usually characteristics of: Technological uncertainty, subsidy, and spin-offs are usually characteristics of: A. Fragmented industries. A. Fragmented industries. B. Declining industries. B. Declining industries. C. Mature industries. C. Mature industries. D. Emerging industries. D. Emerging industries. Answer: D Answer: D
Question 2 Question 2 An internal auditor is reviewing physical and environmental controls for an IT An internal auditor is reviewing physical and environmental controls for an IT organization. organization. Which control activity should not be part of this review? Which control activity should not be part of this review? A. Develop and test the organization's disaster recovery plan. A. Develop and test the organization's disaster recovery plan. B. Install and test fire detection and suppression equipment. B. Install and test fire detection and suppression equipment. C. Restrict access to tangible IT resources. C. Restrict access to tangible IT resources. D. Ensure that at least one developer has access to both systems and operations. D. Ensure that at least one developer has access to both systems and operations. Answer: D Answer: D
Question 3 Question 3 Which of the following does not provide operational assurance that a computer system is operating Which of the following does not provide operational assurance that a computer system is operating properly? properly? A. Performing a system audit. A. Performing a system audit. B. Making system changes. B. Making system changes. C. Testing policy compliance. C. Testing policy compliance. D. Conducting system monitoring. D. Conducting system monitoring. Answer: B Answer: B
Question 4 Question 4 An organization has started allowing employees to use their personal smart devices to accept vendor An organization has started allowing employees to use their personal smart devices to accept vendor payments. payments. What should the organization's bring-your-own-device (BYOD) policy include to specifically address What should the organization's bring-your-own-device (BYOD) policy include to specifically address security and privacy required by the Payment Card Data Security Standard (PCI DSS)? security and privacy required by the Payment Card Data Security Standard (PCI DSS)? A. Approved devices A. Approved devices B. Mobile applications B. Mobile applications C. Data storage. C. Data storage. D. Backups and transfers D. Backups and transfers Answer: C Answer: C
Question 5 Question 5 According to MA guidance on IT. which of the following would be considered a primary control for According to MA guidance on IT. which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting? a spreadsheet to help ensure accurate financial reporting? A. Formulas and static data are locked or protected. A. Formulas and static data are locked or protected. B. The spreadsheet is stored on a network server that is backed up daily. B. The spreadsheet is stored on a network server that is backed up daily. C. The purpose and use of the spreadsheet are documented. C. The purpose and use of the spreadsheet are documented. D. Check-in and check-out software is used to control versions. D. Check-in and check-out software is used to control versions. Answer: A Answer: A
Question 6 Question 6 What kind of strategy would be most effective for an organization to adopt in order to implement a What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical product lines across all of its markets? unique advertising campaign for selling identical product lines across all of its markets? A. Export strategy A. Export strategy B. Transnational strategy. B. Transnational strategy. C. Multi-domestic strategy C. Multi-domestic strategy D. Globalization strategy. D. Globalization strategy. Answer: C Answer: C
Question 7 Question 7 According to MA guidance, which of the following best describes an adequate management (audit) According to MA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger? trail application control for the general ledger? A. Report identifying data that is outside of system parameters A. Report identifying data that is outside of system parameters B. Report identifying general ledger transactions by time and individual B. Report identifying general ledger transactions by time and individual C. Report comparing processing results with original input C. Report comparing processing results with original input D. Report confirming that the general ledger data was processed without error. D. Report confirming that the general ledger data was processed without error. Answer: B Answer: B
Question 8 Question 8 Which of the following is based on the concept that there is not one best leadership style and that Which of the following is based on the concept that there is not one best leadership style and that successful leadership depends on a match between the leader, the situation, and the subordinate? successful leadership depends on a match between the leader, the situation, and the subordinate? A. Attribute theory. A. Attribute theory. B. Path goal model B. Path goal model C. Life cycle model C. Life cycle model D. Contingency theory D. Contingency theory Answer: D Answer: D
Question 9 Question 9 According to IIA guidance on IT. which of the following plans would pair the identification of According to IIA guidance on IT. which of the following plans would pair the identification of critical business processes with recovery time objectives? critical business processes with recovery time objectives? A. The business continuity management charter. A. The business continuity management charter. B. The business continuity risk assessment plan B. The business continuity risk assessment plan C. The business impact analysis plan C. The business impact analysis plan D. The business case for business continuity planning D. The business case for business continuity planning Answer: C Answer: C
Question 10 Question 10 Which of the following is an example of a phishing attack? Which of the following is an example of a phishing attack? A. An employee receives an email that appears to be from the organization's bank, though it is not. A. An employee receives an email that appears to be from the organization's bank, though it is not. The employee replies to the email and sends the requested confidential information. The employee replies to the email and sends the requested confidential information. B. An organization's website has been hacked. The hacker added political content that is not B. An organization's website has been hacked. The hacker added political content that is not consistent with the organization's views. consistent with the organization's views. C. An organization's systems have been compromised by malicious software. The software locks the C. An organization's systems have been compromised by malicious software. The software locks the organization's operating system until d ransom is paid. organization's operating system until d ransom is paid. D. An organization's communication systems have been intercepted. A communication D. An organization's communication systems have been intercepted. A communication session is controlled by an unauthorized third party. session is controlled by an unauthorized third party. Answer: A Answer: A