IIA-CIA-Part3 Practice Test Questions

333 Questions


Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?


A. Phishing.


B. Ransomware.


C. Hacking.


D. Makvare





D.
  Makvare

An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?


A. The capital accounts of the partners should be increased by she original cost of the contributed equipment.


B. The capital accounts should be increased using a weighted average based by the current percentage of ownership.


C. No action is needed, as the capital account of each partner was increased by the correct amount,


D. The capital accounts of the partners should be increased by She fair market value of their contribution.





C.
  No action is needed, as the capital account of each partner was increased by the correct amount,

Which of the following risks is best addressed by encryption?


A. Information integrity risk


B. Privacy risk


C. Access risk


D. Software risk





B.
  Privacy risk

When would a contract be dosed out?


A. When there's a dispute between the contracting parties


B. When ail contractual obligations have been discharged.


C. When there is a force majenre


D. When the termination clause is enacted





B.
  When ail contractual obligations have been discharged.

Which of the following is an indicator of liquidity that is more dependable than working capital?


A. Acid-test (quick) ratio


B. Average collection period


C. Current ratio.


D. Inventory turnover.





A.
  Acid-test (quick) ratio

An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety



The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?


A. Average cost method


B. First-in, first-out (FIFO) method


C. Specific identification method


D. Activity-based costing method





A.
  Average cost method

A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?


A. Cost of sales and net income are understated.


B. Cost of sales and net income are overstated.


C. Cost of sales is understated and not income is overstated.


D. Cost of sales is overstated and net Income is understated.





D.
  Cost of sales is overstated and net Income is understated.

Which of the following statements. Is most accurate concerning the management and audit of a web server?


A. The file transfer protocol (FTP) should always be enabled.


B. The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.


C. The number of ports and protocols allowed to access the web server should be maximized.


D. Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.





D.
  Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.

Which of the following is improved by the use of smart devices?


A. Version control


B. Privacy


C. Portability


D. Secure authentication





C.
  Portability

Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?


A. Decentralized


B. Centralized


C. Departmentalized


D. Tall structure





A.
  Decentralized

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?


A. Cold recovery plan,


B. Outsourced recovery plan.


C. Storage area network recovery plan.


D. Hot recovery plan





C.
  Storage area network recovery plan.

Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?


A. The term describes budgets that exclude fixed costs.


B. Flexible budgets exclude outcome projections, which are hard to determine, and instead rely on the most recent actual outcomes.


C. The term is a red flag for weak budgetary control activities.


D. Flexible budgets project data for different levels of activity.





D.
  Flexible budgets project data for different levels of activity.


Page 12 out of 28 Pages
Previous