Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
Which of the following situations best applies to an organization that uses a project, rather than a process, to accomplish its business activities?
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?
Given the information below, which organization is in the weakest position to pay short-term debts?
Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000
Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000
Organization C: Current assets constitute $900,000; Current liabilities are $300,000
Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000
Which of the following represents an example of a physical security control?
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
Which of the following is true of matrix organizations?
During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?
An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?
An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical products across all of its markets?
Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?
A new manager received computations of the internal rate of return regarding his project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Which of the following is used during all three stages of project management?
Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?
Which of the following statements is true regarding cost-volume-profit analysis?
Which of the following lists is comprised of computer hardware only?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Which of the following is an example of a physical control?
An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?
Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?
Which of the following statements best describes the current state of data privacy regulation?
Which of the following is a systems software control?
Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?
Which of the following is an example of an application control?
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?
Which of the following responsibilities would ordinarily fall under the help desk function of an organization?
According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?
A motivational technique generally used to overcome monotony and job-related boredom is:
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
Which of the following statements is true regarding the management-by-objectives method?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
Which of the following principles s shared by both hierarchies and open organizational structures?
1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. Employees at all levels should be empowered to make decisions.
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?
How do data analysis technologies affect internal audit testing?
While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?
An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?
Which of the following would be a concern related to the authorization controls utilized for a system?
Which of the following scenarios best illustrates a spear phishing attack?
Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?
Which of the following statements. Is most accurate concerning the management and audit of a web server?
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
Which of the following techniques would best detect on inventory fraud scheme?
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
Which of the following is a likely result of outsourcing?
Which of the following is the best example of IT governance controls?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?
Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?
During which phase of the contracting process ere contracts drafted for a proposed business activity?
A one-time password would most likely be generated in which of the following situations?
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
Which of the following IT-related activities is most commonly performed by the second line of defense?
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?
An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?
At one organization, the specific terms of a contract require both the promisor end promise to sign the contract in the presence of an independent witness.
What is the primary role to the witness to these signatures?
According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?
Which of the following is classified as a product cost using the variable costing method?
1. Direct labor costs.
2. Insurance on a factory.
3. Manufacturing supplies.
4. Packaging and shipping costa.
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Which of the following is a necessary action for an internal audit function if senior management chooses not to take action to remediate the finding and accepts the risk?
The chief audit executive (CAE) identified an unacceptable risk and believes that the risk is not being mitigated to an acceptable level. Which of the following is the CAE's next step in this situation?
When should the results of internal quality assessments be communicated to senior management and the board?
The sole internal auditor of a municipality wants to implement proper supervision over internal audit workpapers. Which of the following would be the most appropriate?
According to IIA guidance, which of the following statements is true regarding the chief audit executive's (CAE’s) responsibility for following up on management action plans?
According to IIA guidance, which of the following statements is true regarding communication of engagement results?
An organization's IT systems can only be accessed using the organization's virtual private network. However, organizational emails, videoconferencing, and file-sharing tools are cloud-based and can be accessed using multi-factor authentication via any device. Which of the following risks should the organization acknowledge?
Which of the following data privacy concerns can be attributed specifically to blockchain technologies?
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
In light of increasing emission taxes in the European Union, a car manufacturer introduced a new middle-class hybrid vehicle specifically for the European market only. Which of the following competitive strategies has the manufacturer used?
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
During a routine bank branch audit, the internal audit function observed that the sole security guard at the branch only worked part time. The chief audit executive (CAE) believed that this increased the risk of loss of property and life in the event of a robbery. The branch security manager informed the CAE that a full-time guard was not needed because the branch was in close proximity to a police station. Still, the CAE found this to be an unacceptable risk due to the recent increase in robberies in that area. Which of the following is the most appropriate next step for the CAE to take?
Which of the following statements depicts a valid role of the internal audit function in ensuring the effectiveness of management action plans?
Which of the following statements is true regarding internal audit methodologies?
How should internal auditors respond when the manager of an area under review disagrees with a finding?
Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?
Which of the following would most likely serve as a foundation for individual operational goats?
Which of the following is an established systems development methodology?
Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze,
improve, and control. Which of the following best describes this approach?
An internal audit engagement team found that the risk register of the project under review did not include significant risks identified by the internal audit function. The project manager explained that risk register preparations are facilitated by risk managers and that each project’s risk review follows the same set of questions. Which of the following recommendations will likely add the greatest value to the project management process of the organization?
Which of the following lists best describes the classification of manufacturing costs?
Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?
Which of the following describes a third-party network that connects an organization specifically with its trading partners?
An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?
According to 11A guidance on IT, which of the following are indicators of poor change management?
1. Inadequate control design.
2. Unplanned downtime.
3. Excessive troubleshooting .
4. Unavailability of critical services.
During an audit of the payroll system, the internal auditor identifies and documents the following condition:
"Once a user is logged into the system, the user has access to all functionality within the system."
What is the most likely root cause for tins issue?
Upon completing a follow-up audit engagement, the chief audit executive (CAE) noted that management has not implemented any mitigation measures to address the high risks that were reported in the initial audit report. What initial step must the CAE take to address this situation?
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?
Which of the following storage options would give the organization the best chance of recovering data?
According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?
Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?
Which of the following is most influenced by a retained earnings policy?
Through meetings with management, an organization's chief audit executive (CAE) learns of a risk that exceeds the established risk tolerance. What would be an appropriate next action for the CAE to take?
The board and senior management agree to outsource the internal audit function. Which of the following is true regarding the company’s quality assurance and improvement program (QAIP)?
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
Which of the following best describes a potential benefit of using data analyses?
Which of the following statements is true regarding activity-based costing (ABC)?
A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?
Which of the following controls is the most effective for ensuring confidentially of transmitted information?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
Which of the following best describes the use of predictive analytics?
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?
Which of the following security controls would be me most effective in preventing security breaches?
Which of the following is required in effective IT change management?
Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?
How can the concept of relevant cost help management with behavioral analyses?
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?
Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?
A organization finalized a contract in which a vendor is expected to design, procure, and construct a power substation for $3,000,000. In this scenario, the organization agreed to which of the following types of contracts?
Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?
Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?
Which of the following would be the best method to collect information about employees' job satisfaction?
While conducting' audit procedures at the organization's data center an internal auditor noticed the following:
- Backup media was located on data center shelves.
- Backup media was organized by date.
- Backup schedule was one week in duration.
The system administrator was able to present restore logs.
Which of the following is reasonable for the internal auditor to conclude?
An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?
Which of the following statements distinguishes a router from a typical switch?
According to I1A guidance on IT. which of the following activities regarding information security Is most likely to be the responsibility of line management as opposed to executive management, internal auditors, or the board?
Which of the following intangible assets is considered to have an indefinite life?
The budgeted cost of work performed is a metric best used to measure which project management activity?
The management of working capital is most crucial for which of the following aspects of business?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
According to The IIA's Three Lines Model, which of the following IT security activities is commonly shared by all three lines?
Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?
An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?
Which of the following is an example of a physical control designed to prevent security breaches?