Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part3 Exam Dumps - Business Knowledge for Internal Auditing

Go to page:
Question # 25

During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?

A.

Initiation phase

B.

Bidding phase

C.

Development phase

D.

Negotiation phase

Full Access
Question # 26

How do data analysis technologies affect internal audit testing?

A.

They improve the effectiveness of spot check testing techniques.

B.

They allow greater insight into high risk areas.

C.

They reduce the overall scope of the audit engagement,

D.

They increase the internal auditor's objectivity.

Full Access
Question # 27

Which of the following is an example of two-factor authentication?

A.

The user's facial geometry and voice recognition.

B.

The user's password and a separate passphrase.

C.

The user's key fob and a smart card.

D.

The user's fingerprint and a personal Identification number.

Full Access
Question # 28

Which of the following types of budgets will best provide the basis for evaluating the organization's performance?

A.

Cash budget.

B.

Budgeted balance sheet.

C.

Selling and administrative expense budget.

D.

Budgeted income statement.

Full Access
Question # 29

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

A.

Direct, product costs.

B.

Indirect product costs.

C.

Direct period costs,

D.

Indirect period costs

Full Access
Question # 30

Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?

A.

Predictive analytics.

B.

Prescriptive analytics.

C.

Descriptive analytics.

D.

Diagnostic analytics.

Full Access
Question # 31

Which of the following is a systems software control?

A.

Restricting server room access to specific individuals

B.

Housing servers with sensitive software away from environmental hazards

C.

Ensuring that all user requirements are documented

D.

Performing of intrusion testing on a regular basis

Full Access
Question # 32

Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?

A.

Job complicating

B.

Job rotation

C.

Job enrichment

D.

Job enlargement

Full Access
Go to page: