Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IIA-CIA-Part3 Exam Dumps - Internal Audit Function

Searching for workable clues to ace the IIA IIA-CIA-Part3 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s IIA-CIA-Part3 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 57

An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?

A.

Estimate time required to complete the whole project.

B.

Determine the responses to expected project risks.

C.

Break the project into manageable components.

D.

Identify resources needed to complete the project

Full Access
Question # 58

Which of the following scenarios best illustrates a spear phishing attack?

A.

Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.

B.

A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.

C.

A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.

D.

Many users of a social network service received fake notifications of a unique opportunity to invest in a new product

Full Access
Question # 59

Which of the following practices impacts copyright issues related to the manufacturer of a smart device?

A.

Session hijacking.

B.

Jailbreaking

C.

Eavesdropping,

D.

Authentication.

Full Access
Question # 60

An internal auditor is reviewing the sales and collections processes of an e-commerce organization that is facing budget constraints. The auditor found that the accountant did not perform reconciliations of cash collections in a timely manner. The auditor determined that the reason was timing errors in the interfacing process between the customer payments portal and the accounting system. The current customer payments portal was recently implemented to replace a legacy system. The finance manager is in charge of the customer payments portal. Which of the following recommendations is the most appropriate to address the root cause of this deficiency?

A.

The accountant, in view of the budget constraints, should consider a manual workaround to include unposted transactions into the accounting system in a timely manner

B.

Management should consider investing in a new customer payments portal, as the existing portal is unable to interface accurately with the accounting system

C.

The finance manager should work with IT and the vendor of the customer payments portal to rectify the interfacing errors

D.

The accountant should perform reconciliations of cash collections to customer payment records and investigate exceptions in a timely manner

Full Access
Question # 61

Which of the following is an example of a phishing attack?

A.

An organization’s website becomes flooded with malicious traffic on the first day of the online shopping season, causing the website to crash and preventing customers from purchasing deals online

B.

The employees of a retail organization responded to emails with a link to malware that enabled a hacker to access the point-of-sale system and obtain customers’ credit card information

C.

An organization’s employees clicked on a link that allowed a worm to infiltrate and encrypt the organization’s operating system, rendering it unusable. A group of hackers is demanding payment to unlock the encryption

D.

A group of online activists hacked into the private email and confidential records of the local police department and released the information online to expose the corrupt practices of the department

Full Access
Question # 62

Which of the following would be classified as IT general controls?

A.

Error listings.

B.

Distribution controls.

C.

Transaction logging.

D.

Systems development controls.

Full Access
Question # 63

Which of the following is improved by the use of smart devices?

A.

Version control

B.

Privacy

C.

Portability

D.

Secure authentication

Full Access
Question # 64

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?

A.

Boundary defense

B.

Malware defense.

C.

Penetration tests

D.

Wireless access controls

Full Access
Go to page: