As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:
“Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.” The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
Which of the following best describes the type of control provided by a firewall?
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
Which of the following would be the strongest control to prevent unauthorized wireless network access?
An organization has an immediate need for servers, but no time to complete capital acquisitions. Which of the following cloud services would assist with this situation?
Which of the following is true regarding the use of remote wipe for smart devices?
Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?
Which of the following situations best applies to an organization that uses a project, rather than a process, to accomplish its business activities?
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
Which of the following principles is shared by both hierarchical and open organizational structures?
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A supervisor's span of control should not exceed seven subordinates.
Responsibility should be accompanied by adequate authority.
Employees at all levels should be empowered to make decisions.
Which of the following statements is most accurate concerning the management and audit of a web server?
Which of the following is classified as a product cost using the variable costing method?
Direct labor costs.
Insurance on a factory.
Manufacturing supplies.
Packaging and shipping costs.
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange (EDI)?
Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?
For employees, the primary value of implementing job enrichment is which of the following?
Which of the following data security policies is most likely to be the result of a data privacy law?
Which of the following statements is true regarding cost-volume-profit analysis?
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recovery solution?
Which of the following differentiates a physical access control from a logical access control?
Which of the following statements is true regarding the management-by-objectives (MBO) approach?
Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?
During which phase of the contracting process are contracts drafted for a proposed business activity?
According to IIA guidance, which of the following are typical physical and environmental IT controls?
According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?
Which of the following describes the primary advantage of using data analytics in internal auditing?
According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
A company produces water buckets with the following costs per bucket:
Direct labor = 82
Direct material = $5
Fixed manufacturing = 83.50
Variable manufacturing = 82.50
The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.
Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?
Which of the following best describes a transformational leader, as opposed to a transactional leader?
What is the primary risk associated with an organization adopting a decentralized structure?
According to IIA guidance on IT, which of the following strategies would provide the most effective access control over an automated point-of-sale system?
Which of the following would most likely serve as a foundation for individual operational goats?
Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Which of the following activities best illustrates a user's authentication control?
Which of the following describes a third-party network that connects an organization specifically with its trading partners?
Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?
An organization's technician was granted a role that enables him to prioritize projects throughout the organization. Which type of authority will the technician most likely be exercising?
Which of the following is a disadvantage in a centralized organizational structure?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
Which of the following would be a concern related to the authorization controls utilized for a system?
Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?
An organization discovered fraudulent activity involving the employee time-tracking system. One employee regularly docked in and clocked out her co-worker friends on their days off, inflating their reported work hours and increasing their wages. Which of the following physical authentication devices would be most effective at disabling this fraudulent scheme?
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?
Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Several organizations have developed a strategy to open co-owned shopping malls. What would be the primary purpose of this strategy?
Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?
Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?
Which of the following capital budgeting techniques considers the tune value of money?
An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data.
What would be the most appropriate directive control in this area?
For employees, the primary value of implementing job enrichment is which of the following?
The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
1. Favorable labor efficiency variance.
2. Adverse labor rate variance.
3. Adverse labor efficiency variance.
4. Favorable labor rate variance.
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?
Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?
An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?
Which of the following is classified as a product cost using the variable costing method?
1. Direct labor costs.
2. Insurance on a factory.
3. Manufacturing supplies.
4. Packaging and shipping costa.
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?
An organization with a stable rating, as assessed by International rating agencies, has issued a bond not backed by assets or collateral. Payments of the interests and the principal to bondholders are guaranteed by the organization. Which type of bond did the organization issue?
According to Maslow's hierarchy of needs theory, which of the following would likely have the most impact on retaining staff, if their lower-level needs are already met?
The management of working capital is most crucial for which of the following aspects of business?
In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?
An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?
An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?
When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?
A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?
The chief audit executive (CAE) has been asked to evaluate the chief technology officer's proposal to outsource several key functions in the organization's IT department. Which of the following would be the most appropriate action for the CAE to determine whether the proposal aligns with the organization's strategy?
In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?
Which of the following types of budgets will best provide the basis for evaluating the organization's performance?
An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?
Which of the following is an indicator of liquidity that is more dependable than working capital?
Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
Which of the following Issues would be a major concern for internal auditors when using a free software to analyze a third-party vendor's big data?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?
When evaluating the help desk services provided by a third-party service provider which of the following is likely to be the internal auditor's greatest concern?
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?