When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
Which of the following types of budgets will best provide the basis for evaluating the organization's performance?
An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?
Which of the following controls would enable management to receive timely feedback and help mitigate unforeseen risks?
Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?
Which of the following security controls would be me most effective in preventing security breaches?
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?
Which of the following capital budgeting techniques considers the expected total net cash flows from investment?
Which of the following is an example of a physical control designed to prevent security breaches?
Which of the following IT professionals is responsible for providing maintenance to switches and routers to keep IT systems running as intended?
An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?
Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
Which of the following networks is suitable for an organization that has operations In multiple cities and countries?
Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?
Which of the following statements is true regarding cost-volume-profit analysis?
Which of the following statements. Is most accurate concerning the management and audit of a web server?
Which of the following is classified as a product cost using the variable costing method?
1. Direct labor costs.
2. Insurance on a factory.
3. Manufacturing supplies.
4. Packaging and shipping costa.
Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
Which of these instances accurately describes the responsibilities for big data governance?
In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?
Which of the following performance measures includes both profits and investment base?
For employees, the primary value of implementing job enrichment is which of the following?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
Which of the following principles s shared by both hierarchies and open organizational structures?
1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. Employees at all levels should be empowered to make decisions.
Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
With regard to project management, which of the following statements about project crashing Is true?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
Which of the following is a disadvantage in a centralized organizational structure?
Which of the following best explains why an organization would enter into a capital lease contract?
According to IIA guidance, which of the following links computers and enables them to -communicate with each other?
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?
Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?
Which of the following should be included in a data privacy poky?
1. Stipulations for deleting certain data after a specified period of time.
2. Guidance on acceptable methods for collecting personal data.
3. A requirement to retain personal data indefinitely to ensure a complete audit trail,
4. A description of what constitutes appropriate use of personal data.
An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?
A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?
Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?
Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?
Which of the following statements is true regarding cost-volume-profit analysis?
Which of the following principles is shared by both hierarchical and open organizational structures?
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A supervisor's span of control should not exceed seven subordinates.
Responsibility should be accompanied by adequate authority.
Employees at all levels should be empowered to make decisions.
During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
Which of the following IT-related activities is most commonly performed by the second line of defense?
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
Which of the following data security policies is most likely to be the result of a data privacy law?
Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?
Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?
A motivational technique generally used to overcome monotony and job-related boredom is:
An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
An organization uses the management-by-objectives method, whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
Which of the following application controls is the most dependent on the password owner?
According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?
What kind of strategy would be most effective for an organization to adopt in order to implement a unique advertising campaign for selling identical products across all of its markets?
Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?
According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?
Which of the following differentiates a physical access control from a logical access control?
Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?
Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Which of the following is a characteristic of using a hierarchical control structure?
Which of the following describes a third-party network that connects an organization specifically with its trading partners?
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?
Which of the following lists best describes the classification of manufacturing costs?
An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?
Which of the following is true regarding the use of remote wipe for smart devices?
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
A company produces water buckets with the following costs per bucket:
Direct labor = 82
Direct material = $5
Fixed manufacturing = 83.50
Variable manufacturing = 82.50
The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.
Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?
According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?
According to 11A guidance on IT, which of the following are indicators of poor change management?
1. Inadequate control design.
2. Unplanned downtime.
3. Excessive troubleshooting .
4. Unavailability of critical services.
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
An organization that relies heavily on IT wants to contain the impact of potential business disruption to a period of approximately four to seven days. Which of the following
business recovery strategies would most efficiently meet this organization's needs?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
Which of the following security controls would provide the most efficient and effective authentication for customers to access these online shopping account?
Which of the following techniques would best detect an inventory fraud scheme?
Which of the following activities best illustrates a user's authentication control?
During an audit of the payroll system, the internal auditor identifies and documents the following condition:
"Once a user is logged into the system, the user has access to all functionality within the system."
What is the most likely root cause for tins issue?
Which of the following best describes the purpose of fixed manufacturing costs?
A small chain of grocery stores made a reporting error and understated its ending inventory. What effect would this have on the income statement for the following year?
Which of the following best describes a transformational leader, as opposed to a transactional leader?