Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

IIA-CIA-Part3 Exam Dumps - Business Knowledge for Internal Auditing

Go to page:
Question # 49

Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?

A.

Draft separate audit reports for business and IT management.

B.

Conned IT audit findings to business issues.

C.

Include technical details to support IT issues.

D.

Include an opinion on financial reporting accuracy and completeness.

Full Access
Question # 50

A company records income from an investment in common stock when it does which of the following?

A.

Purchases bonds.

B.

Receives interest.

C.

Receives dividends

D.

Sells bonds.

Full Access
Question # 51

A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services. Which of the following best describes the restaurants strategy?

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Full Access
Question # 52

Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?

A.

A list of trustworthy, good traffic and a list of unauthorized, blocked traffic.

B.

Monitoring for vulnerabilities based on industry intelligence.

C.

Comprehensive service level agreements with vendors.

D.

Firewall and other network perimeter protection tools.

Full Access
Question # 53

Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?

A.

Last-in-first-Out (LIFO}.

B.

Average cost.

C.

First-in-first-out (FIFO).

D.

Specific identification

Full Access
Question # 54

What is the primary purpose of an integrity control?

A.

To ensure data processing is complete, accurate, and authorized

B.

To ensure data being processed remains consistent and intact

C.

To monitor the effectiveness of other controls

D.

To ensure the output aligns with the intended result

Full Access
Question # 55

Which of the following represents an example of a physical security control?

A.

Access rights are allocated according to the organization’s policy

B.

There is confirmation that data output is accurate and complete

C.

Servers are located in locked rooms to which access is restricted

D.

A record is maintained to track the process from data input to storage

Full Access
Question # 56

Which of the following is classified as a product cost using the variable costing method?

Direct labor costs.

Insurance on a factory.

Manufacturing supplies.

Packaging and shipping costs.

A.

1 and 2

B.

1 and 3

C.

2 and 4

D.

3 and 4

Full Access
Go to page: