IIA IIA-CIA-Part2 Exam Practice Questions (P. 1)
- Full Access (937 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which of the following would be a red flag that indicates the possibility of inventory fraud?
I. The controller has assumed responsibility for approving all payments to certain vendors.
II. The controller has continuously delayed installation of a new accounts payable system, despite a corporate directive to implement it.
III. Sales commissions are not consistent with the organization's increased levels of sales.
IV. Payments to certain vendors are supported by copies of receiving memos, rather than originals.
I. The controller has assumed responsibility for approving all payments to certain vendors.
II. The controller has continuously delayed installation of a new accounts payable system, despite a corporate directive to implement it.
III. Sales commissions are not consistent with the organization's increased levels of sales.
IV. Payments to certain vendors are supported by copies of receiving memos, rather than originals.
- AI and II only
- BII and III only
- CI, II, and IV only
- DI, III, and IV only
Correct Answer:
C
C
send
light_mode
delete
Question #2
During an operational audit of a chain of pizza delivery stores, an auditor determined that cold pizzas were causing customer dissatisfaction. A review of oven calibration records for the last six months revealed that adjustments were made on over 40 percent of the ovens. Based on this, the auditor:
- AHas enough evidence to conclude that improperly functioning ovens are the cause.
- BNeeds to conduct further inquiries and reviews to determine the impact of the oven variations on the pizza temperature.
- CHas enough evidence to recommend the replacement of some of the ovens.
- DMust search for another cause since approximately 60 percent of the ovens did not require adjustment.
Correct Answer:
B
B
send
light_mode
delete
Question #3
When assessing the risk associated with an activity, an internal auditor should:
- ADetermine how the risk should best be managed.
- BProvide assurance on the management of the risk.
- CModify the risk management process based on risk exposures.
- DDesign controls to mitigate the identified risks.
Correct Answer:
B
B
send
light_mode
delete
Question #4
Which of the following procedures would provide the best evidence of the effectiveness of a credit-granting function?
- AObserve the process.
- BReview the trend in receivables write-offs.
- CAsk the credit manager about the effectiveness of the function.
- DCheck for evidence of credit approval on a sample of customer orders.
Correct Answer:
B
B
send
light_mode
delete
Question #5
The most effective way for internal auditors to enhance the reliability of computerized financial and operating information is by:
- ADetermining if controls over record keeping and reporting are adequate and effective.
- BReviewing data provided by information systems to test compliance with external requirements.
- CDetermining if information systems provide management with timely information.
- DDetermining if information systems provide complete information.
Correct Answer:
A
A
send
light_mode
delete
Question #6
Which of the following situations might allow an employee to steal checks sent to an organization and subsequently cash them?
- AChecks are not restrictively endorsed when received.
- BOnly one signature is required on the organization's checks.
- COne employee handles both accounts receivable and purchase orders.
- DOne employee handles both cash deposits and accounts payable.
Correct Answer:
A
A
send
light_mode
delete
Question #7
An internal auditor is assigned to conduct an audit of security for a local area network (LAN) in the finance department of the organization. Investment decisions, including the use of hedging strategies and financial derivatives, use data and financial models which run on the LAN. The LAN is also used to download data from the mainframe to assist in decisions. Which of the following should be considered outside the scope of this security audit engagement?
- AInvestigation of the physical security over access to the components of the LAN.
- BThe ability of the LAN application to identify data items at the field or record level and implement user access security at that level.
- CInterviews with users to determine their assessment of the level of security in the system and the vulnerability of the system to compromise.
- DThe level of security of other LANs in the company which also utilize sensitive data.
Correct Answer:
D
D
send
light_mode
delete
Question #8
An audit of management's quality program includes testing the accuracy of the cost-of-quality reports provided to management. Which of the following internal control objectives is the focus of this testing?
- ATo ensure compliance with policies, plans, procedures, laws, and regulations.
- BTo ensure the accomplishment of established objectives and goals for operations or programs.
- CTo ensure the reliability and integrity of information.
- DTo ensure the economical and efficient use of resources.
Correct Answer:
C
C
send
light_mode
delete
Question #9
When internal auditors provide consulting services, the scope of the engagement is primarily determined by:
- AInternal auditing standards.
- BThe audit engagement team.
- CThe engagement client.
- DThe internal audit activity's charter.
Correct Answer:
C
C
send
light_mode
delete
Question #10
A manufacturing process could create hazardous waste at several production stages, from raw materials handling to finished goods storage. If the objective of a pollution prevention audit engagement is to identify opportunities for minimizing waste, in what order should the following opportunities be considered?
I. Recycling and reuse.
II. Elimination at the source.
III. Energy conservation.
IV. Recovery as a usable product Treatment.
I. Recycling and reuse.
II. Elimination at the source.
III. Energy conservation.
IV. Recovery as a usable product Treatment.
- AV, II, IV, I, III.
- BIV, II, I, III, V.
- CI, III, IV, II, V.
- DIII, IV, II, V, I.
Correct Answer:
B
B
send
light_mode
delete
All Pages