Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part1 Exam Dumps - Internal Audit Fundamentals

Searching for workable clues to ace the IIA IIA-CIA-Part1 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s IIA-CIA-Part1 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 177

An organization allows the same individual to physically access inventory and purchase new assets when supplies are depleted. Which of the following would best help the organization manage the risk of fraud?

A.

Accounting personnel should regularly perform a reconciliation between invoices and purchase orders.

B.

Accounting personnel should conduct a periodic inventory count and reconcile all inventory movements.

C.

Internal auditors should review the frequency and volume of purchased assets to detect trends in the inventory levels.

D.

Management should establish a policy requiring new inventory asset purchases to be made on serialized order forms with copies retained.

Full Access
Question # 178

According to IIA guidance, which of the following statements is true regarding consulting engagements performed by the internal audit activity?

A.

Consulting engagements typically involve four or five parties: the internal audit activity, engagement client, senior management, board, and sometimes the external auditor.

B.

The scope of a consulting engagement is determined by either the engagement supervisor or chief audit executive, and it is finalized prior to beginning fieldwork.

C.

According to the Standards, internal auditors are permitted to carry out certain management functions during a consulting engagement.

D.

A preliminary risk assessment may not be needed for consulting engagements, because the expectations and objectives of the engagement are determined by the engagement client.

Full Access
Question # 179

In the COSO internal control framework, which of the following components serves as the foundation for the other components?

A.

Control activities.

B.

Control environment.

C.

Risk assessment.

D.

Monitoring

Full Access
Question # 180

Which of the following is a control that is used mainly to check the integrity of data entered into a business application, whether the data is entered directly by staff, remotely by a business partner, or through a web-enabled application?

A.

General IT control.

B.

Processing control.

C.

Input control

D.

Integrity control

Full Access
Question # 181

During an audit of a foreign subsidiary an internal audit team discovered that products were sold to a prohibited country due to sanctions. What is the best course of action for the internal audit team?

A.

Include the facts m the engagement communications

B.

Inform me external auditors of the violation.

C.

Report the violation to the government regulators

D.

Consult with the legal department

Full Access
Question # 182

Which of the following should catch the internal auditor's attention as a potential red flag for fraud?

A.

The accounting unit keeps detailed records and preserves supporting documentation in excess of company requirements

B.

One of the subsidiaries has more bank accounts than any other comparable subsidiary

C.

The same external audit firm has been with the company for three years without rotation

D.

The arithmetic median tenure of employees working at production facilities is 15 years

Full Access
Question # 183

A telecommunications organization is planning to cease operations in one or the markets in which it operates due to increasing volatility and uncertainties. Which of the following risk management techniques is the organization selecting?

A.

Risk acceptance.

B.

Risk avoidance.

C.

Risk sharing.

D.

Risk reduction.

Full Access
Question # 184

Wi ch of the following circumstances would most likely be considered a potential red flag for fraud by the internal audit activity?

A.

The monthly payroll reports are not vetted to ensure terminated employees have been removed from the payroll system

B.

The volume of nonroutine journal entries has steadily increased over time.

C.

The database of approved suppliers has not been reviewed the last year

D.

The recent employee survey indicates that some employees remain unaware of the organization’s whistieblower hotline.

Full Access
Go to page: