Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part2 Exam Dumps - Internal Audit Engagement

Searching for workable clues to ace the IIA IIA-CIA-Part2 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s IIA-CIA-Part2 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 185

During an audit of the accounts payable process, an internal auditor was assigned to confirm the quantity of goods received on receiving documents to invoices for those goods and subsequent postings in the accounting system. Which of the following procedures would be most appropriate for this test?

A.

Independent confirmation

B.

Tracing

C.

Vouching

D.

Reperformance

Full Access
Question # 186

Internal auditors map a process by documenting the steps in the process, which provides a framework for understanding. Which of the following is a reason to use narrative memoranda?

A.

To create a detailed risk assessment.

B.

To identify individuals who perform key roles.

C.

To explain a simple process.

D.

To document which outputs support other activities.

Full Access
Question # 187

Which of the following would most likely form part of the engagement scope?

A.

Potential legislation on privacy topics will be employed as a compliance target.

B.

Wire transfers that exceeded $10,000 in the last 12 months will be analyzed.

C.

Both random and judgmental samplings will be used during the engagement.

D.

The probability of significant errors will be considered via risk assessment.

Full Access
Question # 188

Which of the following statements is true regarding internal control questionnaires (ICQs)?

A.

ICQs are most useful in more organic, decentralized organizations with specialized departmental or regional characteristics.

B.

An ICQ can be used effectively either by sending it in advance for management of the area under review to complete or by testing each procedure and recording the results.

C.

An ICQ is not an efficient tool, as it can only inquire about controls and it does not test them.

D.

ICQs are also known as checklist audits and encourage management of the area under review to answer "no" or "yes" more accurately.

Full Access
Question # 189

When setting the scope for the identification and assessment of key risks and controls in a process, which of the following would be the least appropriate approach?

A.

Develop the scope of the audit based on a bottom-up perspective to ensure that all business objectives are considered.

B.

Develop the scope of the audit to include controls that are necessary to manage risk associated with a critical business objective.

C.

Specify that the auditors need to assess only key controls, but may include an assessment of non-key controls if there is value to the business in providing such assurance.

D.

Ensure the audit includes an assessment of manual and automated controls to determine whether business risks are effectively managed.

Full Access
Question # 190

When determining the level of staff and resources to be dedicated to an assurance engagement, which of the following would be the most relevant to the chief audit executive?

A.

The overall adequacy of the internal audit activity's resources

B.

The availability of guest auditors for the engagement

C.

The number of internal auditors used for the previous review of the same area.

D.

The available resources with the specific skill set required

Full Access
Question # 191

Which of the following is a true statement regarding the use of flowcharts as an audit tool?

A.

Flowcharts are typically not well suited to support information provided by a risk and control matrix.

B.

Flowcharts are preferred to narratives, as they can provide much greater detail on the design and operation of a process.

C.

Flowcharts are best applied to linear process flows but cannot address all risks related to the process.

D.

Flowcharts describe process steps but cannot provide the level of detail needed to adequately assess the design of the process.

Full Access
Question # 192

An internal audit activity has to confirm the validity of the activities reported by a grantee that received a charitable contribution from the organization. Which of the following methods would best help meet this objective?

A.

Visiting the grantee to assess whether the execution of the project was in line with the defined grant scope.

B.

Verifying that the grantee's final report is in line with what was depicted in the initial budget request.

C.

Reconciling general ledger accounts used by management of the area under review for reflecting expenses on charitable contributions.

D.

Interviewing employees of the corporate affairs department, which is responsible for charitable activities.

Full Access
Go to page: