IIA IIA-CIA-Part1 Exam Practice Questions (P. 3)
- Full Access (968 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which of the following would not be a factor for senior management to consider when determining the internal audit activity's role in an organization's risk management process?
- AThe extent to which the internal audit activity is outsourced.
- BThe maturity level of risk management practices in the organization.
- CThe competency of the internal auditors in risk management.
- DThe nature of the business and the environment in which the organization operates.
Correct Answer:
A
A
send
light_mode
delete
Question #22
Which of the following best describes the underlying premise of the COSO enterprise risk management framework?
- AManagement should set objectives before assessing risk.
- BEvery entity exists to provide value for its stakeholders.
- CPolicies are established to ensure that risk responses are performed effectively.
- DEnterprise risk management can minimize the impact and likelihood of unanticipated events.
Correct Answer:
B
B
send
light_mode
delete
Question #23
An internal auditor is assigned to conduct an audit of security for a local area network (LAN) in the finance department of the organization. Investment decisions, including the use of hedging strategies and financial derivatives, use data and financial models which run on the LAN. The LAN is also used to download data from the mainframe to assist in decisions. Which of the following should be considered outside the scope of this security audit engagement?
- AInvestigation of the physical security over access to the components of the LAN.
- BThe ability of the LAN application to identify data items at the field or record level and implement user access security at that level.
- CInterviews with users to determine their assessment of the level of security in the system and the vulnerability of the system to compromise.
- DThe level of security of other LANs in the company which also utilize sensitive data.
Correct Answer:
D
D
send
light_mode
delete
Question #24
When internal auditors perform consulting services that add value and improve an organization's operations, these services:
- AImpair the internal auditors' objectivity with respect to an assurance service involving the same engagement client.
- BWould preclude the achievement of assurance from the consulting engagement.
- CShould be consistent with the internal audit activity's empowerment reflected in the charter.
- DImpose no responsibility to communicate information other than to the engagement client.
Correct Answer:
C
C
send
light_mode
delete
Question #25
A manufacturing firm uses hazardous materials in the production of its products. An audit of the firm's processes related to hazardous materials should include.
I. Recommending an environmental management system as part of policies and procedures.
II. Verifying the existence of tracking records for these materials from creation to destruction.
III. Using consultants to avoid self-incrimination of the firm in the event illegalities were detected in an environmental audit.
IV. Evaluating the cost provided for in an environmental liability accrual account.
I. Recommending an environmental management system as part of policies and procedures.
II. Verifying the existence of tracking records for these materials from creation to destruction.
III. Using consultants to avoid self-incrimination of the firm in the event illegalities were detected in an environmental audit.
IV. Evaluating the cost provided for in an environmental liability accrual account.
send
light_mode
delete
Question #26
An organization's accounts payable function improved its internal controls significantly after it received an unsatisfactory audit report.
When planning a follow-up audit of the function, what level of detection risk should be expected if the audit and sampling procedures used are unchanged from the prior audit?
When planning a follow-up audit of the function, what level of detection risk should be expected if the audit and sampling procedures used are unchanged from the prior audit?
- ADetection risk is lower because control risk is lower.
- BDetection risk is lower because control risk is higher.
- CDetection risk is higher because control risk is lower.
- DDetection risk is unchanged although control risk is lower.
Correct Answer:
D
D
send
light_mode
delete
Question #27
Which of the following risk assessment tools would best facilitate the matching of controls to risks?
- AControl matrix.
- BInternal control questionnaire.
- CControl flowchart.
- DProgram evaluation and review technique (PERT) analysis.
Correct Answer:
A
A
send
light_mode
delete
Question #28
Which of the following is an example of sharing risk?
- AAn organization redesigned a business process to change the risk pattern.
- BAn organization outsourced a portion of its services to a third-party service provider.
- CAn organization sold an unprofitable business unit to its competitor.
- DIn order to spread total risk, an organization used multiple vendors for critical materials.
Correct Answer:
B
B
send
light_mode
delete
Question #29
Which of the following components influences the risk consciousness of an organization's people and is the basis for all other components of enterprise risk management?
- AObjective setting.
- BInformation and Communication.
- CRisk Assessment.
- DInternal Environment.
Correct Answer:
D
D
send
light_mode
delete
Question #30
Which of the following is an appropriate consideration by the auditor when preparing an engagement program for a human resource audit?
- AState the work steps in the form of questions.
- BUse standard audit program for HR from previous years.
- CInclude in the audit program certain audit tests requested by audit client.
- DDefer preparation of the audit program after the field work.
Correct Answer:
C
C
send
light_mode
delete
All Pages