IIA-CIA-Part3 Exam - Certified Internal Auditor - Part 3, Business Analysis and Information Technology

certleader.com

We provide real IIA-CIA-Part3 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass IIA IIA-CIA-Part3 Exam quickly & easily. The IIA-CIA-Part3 PDF type is available for reading and printing. You can print more and practice many times. With the help of our IIA IIA-CIA-Part3 dumps pdf and vce product and material, you can easily pass the IIA-CIA-Part3 exam.

Check IIA-CIA-Part3 free dumps before getting the full version:

NEW QUESTION 1

Which of the following is a security feature that involves the use of hardware and software to fitter or prevent specific information from moving between the outside network and the outside network?

  • A. Authorization
  • B. Architecture model
  • C. Firewall
  • D. Virtual private network

Answer: C

NEW QUESTION 2

A chief audit executive (CAE) was asked to participate in the selection of an external auditor. Which of the following would not be a typical responsibility for the CAE?

  • A. Evaluate the proposed external auditor fee.
  • B. Recommend criteria to be used in the selection process.
  • C. Develop appropriate performance metrics.
  • D. Monitor the work of the external auditors.

Answer: C

NEW QUESTION 3

Which of the following is an example of a phishing attack?

  • A. An employee receives an email that appears to be from the organization's bank, though it is no
  • B. The employee replies to the email and sends the requested confidential information.
  • C. An organization's website has been hacke
  • D. The hacker added political content that is not consistent with the organization's views.
  • E. An organization's systems have been compromised by malicious softwar
  • F. The software locks the organization's operating system until d ransom is paid.
  • G. An organization's communication systems have been intercepte
  • H. A communication session is controlled by an unauthorized third party.

Answer: A

NEW QUESTION 4

An organization's account for office supplies on hand had a balance of S9,000 at the end of year one. During year two. the organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?

  • A. A debit to office supplies on hand for S2.500
  • B. A debit to office supplies on hand for $11,500
  • C. A debit to office supplies on hand for S20.500
  • D. A debit to office supplies on hand for S42.500

Answer: A

NEW QUESTION 5

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
* 1. Favorable labor efficiency variance.
* 2. Adverse labor rate variance.
* 3. Adverse labor efficiency variance.
* 4. Favorable labor rate variance.

  • A. 1 and 2.
  • B. 1 and 4.
  • C. 3 and 4.
  • D. 2 and 3.

Answer: A

NEW QUESTION 6

An organization uses the management-by-objectives method, whereby employee performance is based on defined goals Which of the following statements is true regarding this approach?

  • A. It is particularly helpful to management when the organization is facing rapid change
  • B. It is a more successful approach when adopted by mechanistic organizations
  • C. It is more successful when goal-setting is performed not only by management, but by an team members, including lower-level staff.
  • D. It is particularly successful in environments that are prone to having poor employer-employee relations

Answer: C

NEW QUESTION 7

An internal auditor has been asked to conduct an investigation involving allegations of independent contractor fraud. Which of the following controls would be least effective in detecting any potential fraudulent activity?

  • A. Exception report identifying payment anomalies.
  • B. Documented policy and procedures.
  • C. Periodic account reconciliation of contractor charges.
  • D. Monthly management review of all contractor activity.

Answer: B

NEW QUESTION 8

Which of the following is the most effective control to prevent unauthorized entrance of a former employee of the organization?

  • A. Revoking the former employee's biometrics from the entrance systems
  • B. Installing security guards who have undergone a background check at all entrances.
  • C. Installing multiple high-powered surveillance cameras throughout the organization
  • D. Keeping doors locked and accessible with a key that is provided only to employees

Answer: A

NEW QUESTION 9

Which of the following application controls verifies the accuracy of transaction results in a system?

  • A. Input controls
  • B. Output controls
  • C. Processing controls
  • D. Integrity controls

Answer: C

NEW QUESTION 10

Which stage of group development is characterized by a decrease in conflict and hostility among group members and an increase in cohesiveness?

  • A. Forming stage.
  • B. Norming stage.
  • C. Performing stage.
  • D. Storming stage.

Answer: B

NEW QUESTION 11

A software that translates hypertext markup language (HTML) documents and allows a user to view a remote web page is called:

  • A. A transmission control protocol/Internet protocol (TCP/IP).
  • B. An operating system.
  • C. A web browser.
  • D. A web server.

Answer: C

NEW QUESTION 12

Which of me following storage options would give the organization the best chance of recovering data?

  • A. Encrypted physical copies of the data and their encryption keys are stored together at the organization and are readily available upon request
  • B. Encrypted physical copies of the data are stored separately from their encryption keys and both are held in secure locations a few hours away from me organization
  • C. Encrypted reports on usage and database structure changes are stored on a cloud-base
  • D. secured database that is readily accessible
  • E. Encrypted copies of the data are stored in a separate secure location a few hours away while the encryption keys are stored at the organization and are readily available

Answer: D

NEW QUESTION 13

A supervisor receives a complaint from an employee who is frustrated about having to learn a new software program. The supervisor responds that the new software will enable the employee to work more efficiently and with greater accuracy. This response is an example of:

  • A. Empathetic listening.
  • B. Reframing.
  • C. Reflective listening.
  • D. Dialogue.

Answer: B

NEW QUESTION 14

Which of the following are included in ISO 31000 risk principles and guidelines?

  • A. Standards, framework, and process.
  • B. Standards, assessments, and process.
  • C. Principles, framework, and process.
  • D. Principles, practices, and process.

Answer: C

NEW QUESTION 15

According to IIA guidance, which of the following would be a primary reason for an internal auditor to test the organization's IT contingency plan?

  • A. To ensure that adequate controls exist to prevent any significant business interruptions.
  • B. To identify and address potential security weaknesses within the system.
  • C. To ensure that tests contribute to improvement of the program.
  • D. To ensure that deficiencies identified by the audit are promptly addressed.

Answer: C

NEW QUESTION 16

An organization is developing a new online collaboration tool for employees. The tool includes a homepage that is customized to each employee according to his department and job function Which of the following engagements should be conducted to ensure that the organization has included all departments and job
functions in the system before it is implemented?

  • A. An application control review
  • B. A source code review
  • C. A design review
  • D. An access control review

Answer: C

NEW QUESTION 17

According to MA guidance on IT. which of the following controls the routing of data packets to link computers?

  • A. Operating system.
  • B. Control environment.
  • C. Network.
  • D. Application program code.

Answer: C

NEW QUESTION 18

Which of the following principles is shared by both hierarchical and open organizational structures?
* 1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions
* 2. A supervisor's span of control should not exceed seven subordinates
* 3. Responsibility should be accompanied by adequate authority
* 4. Employees at all levels should be empowered to make decisions.

  • A. 1 and 3 only.
  • B. 1 and 4 only.
  • C. 2 and 3 only
  • D. 3 and 4 only.

Answer: A

NEW QUESTION 19

Which of the following stages of contracting focuses on aligning the markets with objectives of the organization?

  • A. Initiation stage
  • B. Bidding stage
  • C. Development stage
  • D. Negotiation stage

Answer: D

NEW QUESTION 20

Which of the following is based on the concept that there is not one best leadership style and that successful leadership depends on a match between the leader, the situation, and the subordinate?

  • A. Attribute theory.
  • B. Path goal model
  • C. Life cycle model
  • D. Contingency theory

Answer: D

NEW QUESTION 21
......

P.S. Certshared now are offering 100% pass ensure IIA-CIA-Part3 dumps! All IIA-CIA-Part3 exam questions have been updated with correct answers: https://www.certshared.com/exam/IIA-CIA-Part3/ (340 New Questions)