Go Back on IIA-CIA-Part3 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

IIA-CIA-Part3 Practice Test


Page 1 out of 6 Pages

Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?


A. Analysis of the full population of existing data.


B. Verification of the completeness and integrity of existing data.


C. Continuous monitoring on a repetitive basis.


D. Analysis of the databases of partners, such as suppliers.





A.
  Analysis of the full population of existing data.

An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is unable to get the desired return on Investment and output per hour of labor. Based on this information, the organization is most likely focused on which of the following?


A. Capital investment and not marketing


B. Marketing and not capital investment


C. Efficiency and not input economy


D. Effectiveness and not efficiency





D.
  Effectiveness and not efficiency

A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?


A. Cost of sales and net income are understated.


B. Cost of sales and net income are overstated.


C. Cost of sales is understated and not income is overstated.


D. Cost of sales is overstated and net Income is understated.





D.
  Cost of sales is overstated and net Income is understated.

Which of the following is a characteristic of using a hierarchical control structure?


A. Less use of policies and procedures.


B. Less organizational commitment by employees.


C. Less emphasis on extrinsic rewards.


D. Less employee’s turnover.





B.
  Less organizational commitment by employees.

Which of the following is an effective preventive control for data center security?


A. Motion detectors.


B. Key card access to the facility.


C. Security cameras.


D. Monitoring access to data center workstations





B.
  Key card access to the facility.


Page 1 out of 6 Pages