Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Senior management has decided to implement the Three Lines of Defense model for risk management. Which of the following best describes senior management's duties with regard to this model?

A.

Ensure compliance with the model.

B.

Identify management functions.

C.

Identify emerging issues.

D.

Set goals for implementation.

Full Access
Question # 5

Which of the following is a limiting factor for capacity expansion?

A.

Government pressure on organizations to increase or maintain employment.

B.

Production orientation of management.

C.

Lack of credible market leader in the industry.

D.

Company diversification.

Full Access
Question # 6

Which of the following engagement observations would provide the least motivation for management to amend or replace an existing cost accounting system?

A.

The distorted unit cost of a service is 50 percent lower than the true cost, while the true cost is 50 percent higher than the competition's cost.

B.

The organization is losing $1,000,000 annually because it incorrectly outsourced an operation based on information from its current system.

C.

The cost of rework, hidden by the current system, is 50 percent of the total cost of all services.

D.

50 percent of total organizational cost has been allocated on a volume basis.

Full Access
Question # 7

An organization's balance sheet indicates that the total asset amount and the total capital stock amount remained unchanged from one year to the next, and no dividends were declared or paid. However, the organization reported a loss of $200,000. Which of the following describes the most likely year-over-year change to the organization's total liabilities and total stockholder equity?

A.

The total liabilities and total stockholder equity both increased.

B.

The total liabilities and total stockholder equity both decreased.

C.

The total liabilities decreased, and the total stockholder equity increased.

D.

The total liabilities increased, and the total stockholder equity decreased.

Full Access
Question # 8

Organizations use matrix management to accomplish which of the following?

A.

To improve the chain of command.

B.

To strengthen corporate headquarters.

C.

To focus better on a single market.

D.

To increase lateral communication.

Full Access
Question # 9

During a review of a web-based application used by customers to check the status of their bank accounts, it would be most important for the internal auditor to ensure that:

A.

Access to read application logs is restricted to authorized users.

B.

Account balance information is encrypted in the database.

C.

The web server used to host the application is located in a physically secure area.

D.

Sensitive data, such as account numbers, are submitted using encrypted communications.

Full Access
Question # 10

Which of the following is true regarding the COSO enterprise risk management framework?

A.

The framework categorizes an organization's objectives to distinct, non overlapping objectives.

B.

Control environment is one of the framework's eight components.

C.

The framework facilitates effective risk management, even if objectives have not been established.

D.

The framework integrates with, but is not dependent upon, the corresponding internal control

framework.

Full Access
Question # 11

An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is unable to get the desired return on investment and output per hour of labor. Based on this information the organization is most likely focused on which of the following?

A.

Capital investment and not marketing

B.

Marketing and not capital investment.

C.

Efficiency and not input economy.

D.

Effectiveness and not efficiency.

Full Access
Question # 12

Which of the following types of analytics would be used by an organization to examine metrics by business units and identity the most profitable business units?

A.

Detailed analytics

B.

Predictive analytics

C.

Diagnostic analytics

D.

Prescriptive analytics

Full Access
Question # 13

Which of the following professional organizations sets standards for quality and environmental audits?

A.

The Committee of Sponsoring Organizations of the Treadway Commission.

B.

The Board of Environmental, Health, and Safety Auditor Certifications.

C.

The International Organization of Supreme Audit Institutions.

D.

The International Standards Organization.

Full Access
Question # 14

In creating a risk-based plan, which of the following best describes a top-down approach to understanding business processes?

A.

Identifying the processes at the activity level.

B.

Analyzing the organization's strategic plan where the business processes are defined.

C.

Analyzing the organization's objectives and identifying the processes needed to achieve the objectives.

D.

Identifying the risks affecting the organization, the objectives, and then the processes concerned.

Full Access
Question # 15

Which of the following activities most significantly increases the risk that a bank will make poor-quality loans to its customers?

A.

Borrowers may not sign all required mortgage loan documentation.

B.

Fees paid by the borrower at the time of the loan may not be deposited in a timely manner.

C.

The bank's loan documentation may not meet the government's disclosure requirements.

D.

Loan officers may override the lending criteria established by senior management.

Full Access
Question # 16

Which audit approach should be employed to test the accuracy of information housed in a database on an un-networked computer?

A.

Submit batches of test transactions through the current system and verify with expected results.

B.

Use a test program to simulate the normal data entering process.

C.

Select a sample of records from the database and ensure it matches supporting documentation.

D.

Evaluate compliance with the organization's change management process.

Full Access
Question # 17

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange?

A.

A time-sensitive just-in-time purchase environment.

B.

A large volume of custom purchases.

C.

A variable volume sensitive to material cost.

D.

A currently inefficient purchasing process.

Full Access
Question # 18

An internal auditor is reviewing physical and environmental controls for an IT organization. Which control activity should not be part of this review?

A.

Develop and test the organization's disaster recovery plan.

B.

Install and test fire detection and suppression equipment.

C.

Restrict access to tangible IT resources.

D.

Ensure that at least one developer has access to both systems and operations.

Full Access
Question # 19

Which of the following roles would be least appropriate for the internal audit activity to undertake with regard to an organization's corporate social responsibility (CSR) program?

A.

Consult on project design and implementation of the CSR program.

B.

Serve as an advisor on internal controls related to CSR.

C.

Identify and prioritize the CSR issues that are important to the organization.

D.

Evaluate the effectiveness of the organization's CSR efforts.

Full Access
Question # 20

Which mindset promotes the most comprehensive risk management strategy?

A.

Increase shareholder value.

B.

Maximize market share.

C.

Improve operational efficiency.

D.

Mitigate losses.

Full Access
Question # 21

Which of the following is an example of a nonfinancial internal failure quality cost?

A.

Decreasing gross profit margins over time.

B.

Foregone contribution margin on lost sales.

C.

Defective units shipped to customers.

D.

Excessive time to convert raw materials into finished goods.

Full Access
Question # 22

Which of the following methods, if used in conjunction with electronic data interchange (EDI), will improve the organization's cash management program, reduce transaction data input time and errors, and allow the organization to negotiate discounts with EDI vendors based on prompt payment?

A.

Electronic funds transfer.

B.

Knowledge-based systems.

C.

Biometrics.

D.

Standardized graphical user interface.

Full Access
Question # 23

Which of the following statements is true regarding the roles and responsibilities associated with a corporate social responsibility (CSR) program?

A.

The board has overall responsibility for the internal control processes associated with the CSR program.

B.

Management has overall responsibility for the effectiveness of governance, risk management, and internal control processes associated with the CSR program.

C.

The internal audit activity is responsible for ensuring that CSR principles are integrated into the

organization's policies and procedures.

D.

Every employee has a responsibility for ensuring the success of the organization's CSR objectives.

Full Access
Question # 24

The first stage in the development of a crisis management program is to:

A.

Formulate contingency plans.

B.

Conduct a risk analysis.

C.

Create a crisis management team.

D.

Practice the response to a crisis.

Full Access
Question # 25

Which of the following is not a common feature of cumulative preferred stock?

A.

Priority over common stock with regard to dilution of shares.

B.

Priority over common stock with regard to earnings.

C.

Priority over common stock with regard to dividend payment.

D.

Priority over common stock with regard to assets.

Full Access
Question # 26

Maintenance cost at a hospital was observed to increase as activity level increased. The following data was gathered:

Activity Level -

Maintenance Cost

Month

Patient Days

January

5,600

$7,900

February

7,100

$8,500

March

5,000

$7,400

April

6,500

$8,200

May

7,300

$9,100

June

8,000

$9,800

If the cost of maintenance is expressed in an equation, what is the independent variable for this data?

A.

Fixed cost.

B.

Variable cost.

C.

Total maintenance cost.

D.

Patient days.

Full Access
Question # 27

Which of the following are typical audit considerations for a review of authentication?

1) Authentication policies and evaluation of controls transactions.

2) Management of passwords, independent reconciliation, and audit trail.

3) Control self-assessment tools used by management.

4) Independent verification of data integrity and accuracy.

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Full Access
Question # 28

The cost to enter a foreign market would be highest in which of the following methods of global expansion?

A.

Joint ventures.

B.

Licensing.

C.

Exporting.

D.

Overseas production.

Full Access
Question # 29

A small furniture-manufacturing firm with 100 employees is located in a two-story building and does not plan to expand. The furniture manufactured is not special-ordered or custom-made. The most likely structure for this organization would be:

A.

Functional departmentalization.

B.

Product departmentalization.

C.

Matrix organization.

D.

Divisional organization.

Full Access
Question # 30

Which of the following are the most appropriate measures for evaluating the change in an organization's liquidity position?

A.

Times interest earned, return on assets, and inventory turnover.

B.

Accounts receivable turnover, inventory turnover in days, and the current ratio.

C.

Accounts receivable turnover, return on assets, and the current ratio.

D.

Inventory turnover in days, the current ratio, and return on equity.

Full Access
Question # 31

Which of the following control techniques would minimize the risk of interception during transmission in an electronic data interchange system?

1) Encryption.

2) Traffic padding.

3) Edit checks.

4) Structured data format.

A.

1 and 2 only

B.

2 and 3 only

C.

3 and 4 only

D.

1, 2, and 3 only

Full Access
Question # 32

Which of the following is a major advantage of decentralized organizations, compared to centralized organizations?

A.

Decentralized organizations are more focused on organizational goals.

B.

Decentralized organizations streamline organizational structure.

C.

Decentralized organizations tend to be less expensive to operate.

D.

Decentralized organizations tend to be more responsive to market changes.

Full Access
Question # 33

In an organization where enterprise risk management practices are mature, which of the following is a core internal audit role?

A.

Giving assurance that risks are evaluated correctly.

B.

Developing the risk management strategy for the board's approval.

C.

Facilitating the identification and evaluation of risks.

D.

Coaching management in responding to risk.

Full Access
Question # 34

The main reason to establish internal controls in an organization is to:

A.

Encourage compliance with policies and procedures.

B.

Safeguard the resources of the organization.

C.

Ensure the accuracy, reliability, and timeliness of information.

D.

Provide reasonable assurance on the achievement of objectives.

Full Access
Question # 35

Which of the following statements accurately describes the responsibility of the internal audit activity (IAA) regarding IT governance?

1) The IAA does not have any responsibility because IT governance is the responsibility of the board and senior management of the organization.

2) The IAA must assess whether the IT governance of the organization supports the organization’s strategies and objectives.

3) The IAA may assess whether the IT governance of the organization supports the organization’s strategies and objectives.

4) The IAA may accept requests from management to perform advisory services regarding how the IT governance of the organization supports the organization’s strategies and objectives.

A.

1 only

B.

4 only

C.

2 and 4

D.

3 and 4

Full Access
Question # 36

An organization decided to install a motion detection system in its warehouse to protect against after-hours theft. According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?

A.

Avoidance.

B.

Reduction.

C.

Elimination.

D.

Sharing.

Full Access
Question # 37

According to IIA guidance on IT. which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?

A.

Formulas and static data are locked or protected.

B.

The spreadsheet is stored on a network server that is backed up daily.

C.

The purpose and use of the spreadsheet are documented.

D.

Check-in and check-out software is used to control versions.

Full Access
Question # 38

Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?

A.

A list of trustworthy good traffic and a list of unauthorized blocked traffic.

B.

Monitoring for vulnerabilities based on industry intelligence

C.

Comprehensive service level agreements with vendors.

D.

Firewall and other network penmeter protection tools.

Full Access
Question # 39

An organization uses the management-by-objectives method, whereby employee performance is based on defined goals Which of the following statements is true regarding this approach?

A.

It is particularly helpful to management when the organization is facing rapid change

B.

It is a more successful approach when adopted by mechanistic organizations

C.

It is more successful when goal-setting is performed not only by management, but by an team members, including lower-level staff.

D.

It is particularly successful in environments that are prone to having poor employer-employee relations

Full Access
Question # 40

Which of the following is improved by the use of smart devices?

A.

Version control

B.

Privacy

C.

Portability

D.

Secure authentication

Full Access
Question # 41

An employee's mobile device used for work was stolen in a home burglary.

Which control, if already implemented by the organization, would best prevent unauthorized access to organizational data stored on the employee's device?

A.

Access control via biometric authentication.

B.

Access control via passcode authentication.

C.

Access control via swipe pattern authentication.

D.

Access control via security question authentication.

Full Access
Question # 42

An internal auditor for a pharmaceutical company is planning a cybersecurity audit and conducting a risk assessment.

Which of the following would be considered the most significant cyber threat to the organization?

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports.

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing the financial information of the company.

Full Access
Question # 43

What is the most significant potential problem introduced by just-in-time inventory systems?

A.

They require significant computer resources.

B.

They are susceptible to supply-chain disruptions.

C.

They require complicated materials-supply contracts.

D.

They prevent manufacturers from scaling up or down to meet changing demands.

Full Access
Question # 44

Which of the following options correctly defines a transmission control protocol/Internet protocol (TCP/IP)?

A.

System software that acts as an interface between a user and a computer.

B.

A standardized set of guidelines that facilitates communication between computers on different

networks.

C.

System software that translates hypertext markup language to allow users to view a remote webpage.

D.

A network of servers used to control a variety of mission-critical operations.

Full Access
Question # 45

According to IIA guidance on IT. which of the following plans would pair the identification of critical business processes with recovery time objectives?

A.

The business continuity management charter.

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Full Access
Question # 46

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

A.

An extranet

B.

A local area network.

C.

An intranet

D.

The internet

Full Access
Question # 47

Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?

A.

Review the list of people with access badges to the room containing the workstation and a log of those who accessed the room.

B.

Review the password length, frequency of change, and list of users for the workstation's login process.

C.

Review the list of people who attempted to access the workstation and failed, as well as error messages.

D.

Review the passwords of those who attempted unsuccessfully to access the workstation and the log of their activity.

Full Access
Question # 48

The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (IAA's) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA.

Which of the following staffing approaches is the CAE most likely to select?

A.

Assign a team with a trained audit manager to plan each audit and distribute field work tasks to various staff auditors.

B.

Assign a team of personnel who have different specialties to each audit and empower team members to participate fully in key decisions.

C.

Assign a team to each audit, designate a single person to be responsible for each phase of the audit, and limit decision making outside of their area of responsibility.

D.

Assign a team of personnel who have similar specialties to specific engagements that would benefit from those specialties and limit key decisions to the senior person.

Full Access
Question # 49

Which of the following budgets serves as a basis for the budgeted income statement?

A.

All financial budgets

B.

All operating budgets

C.

Only the cash budget and budgeted balance sheet

D.

Only the sales and production budgets

Full Access
Question # 50

In accounting, which of the following statements is true regarding the terms debit and credit?

A.

Debit indicates the right side of an account and credit the left side.

B.

Debit means an increase in an account and credit means a decrease.

C.

Credit indicates the right side of an account and debit the left side.

D.

Credit means an increase in an account and debit means a decrease.

Full Access
Question # 51

Which of me following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

A.

First-in first-out method (FIFO)

B.

Last-in first-out method (LIFO)

C.

Specific identification method

D.

Average-cost method

Full Access
Question # 52

Which of the following most accurately describes the purpose of application authentication controls?

A.

To ensure that data input into business applications is valid, complete, and accurate.

B.

To prevent or detect errors in data processed using business applications.

C.

To ensure that business applications are protected from unauthorized logical access.

D.

To ensure the validity, accuracy, and completeness of outputs from business applications.

Full Access
Question # 53

Which of the following application controls verifies the accuracy of transaction results in a system?

A.

Input controls

B.

Output controls

C.

Processing controls

D.

Integrity controls

Full Access
Question # 54

Which of the following statements is true regarding an organization's servers?

A.

Servers optimize data processing by sharing it with other computers on the information system

B.

Servers manage the interconnectivity of system hardware devices in the information system.

C.

Servers manage the data stored in databases residing on the information system.

D.

Servers enforce access controls between networks transmitting data on the information system

Full Access
Question # 55

Which of the following describes the free trade zone in an e-commerce environment?

A.

Zone that separates an organization's servers from outside forces.

B.

Area in which messages are scrutinized to determine if they are authorized.

C.

Area where communication and transactions occur between trusted parties.

D.

Zone where data is encrypted, users are authenticated, and user traffic is filtered.

Full Access
Question # 56

Which of the following is a type of network in which an organization permits specific users (such as existing customers) to have access to its internal network through the Internet by building a virtual private network?

A.

Intranet.

B.

Extranet.

C.

Digital subscriber line.

D.

Broadband.

Full Access
Question # 57

An organization accumulated the following data for the prior fiscal year:

Value of Percentage of

Quarter

Output Produced

Cost X

1

$4,750,000

2.9

2

$4,700,000

3.0

3

$4,350,000

3.2

4

$4,000,000

3.5

Based on this data, which of the following describes the value of Cost X in relation to the value of Output Produced?

A.

Cost X is a variable cost.

B.

Cost X is a fixed cost.

C.

Cost X is a semi-fixed cost.

D.

Cost X and the value of Output Produced are unrelated.

Full Access
Question # 58

Which of the following are appropriate functions for an IT steering committee?

1) Assess the technical adequacy of standards for systems design and programming.

2) Continually monitor of the adequacy and accuracy of software and hardware in use.

3) Assess the effects of new technology on the organization`s IT operations.

4) Provide broad oversight of implementation, training, and operation of new systems.

A.

1, 2, and 3

B.

1, 2, and 4

C.

1, 3, and 4

D.

2, 3, and 4

Full Access
Question # 59

Presented below are partial year-end financial statement data (000 omitted from dollar amounts) for companies A and B:

If company A has a quick ratio of 2:1, then it has an accounts receivable balance of:

A.

$100

B.

$200

C.

$300

D.

$500

Full Access
Question # 60

For a multinational organization, which of the following is a disadvantage of an ethnocentric staffing policy?

1) It significantly raises compensation and staffing costs.

2) It produces resentment among the organization's employees in host countries.

3) It limits career mobility for parent-country nationals.

4) It can lead to cultural myopia.

A.

1 and 4 only

B.

2 and 3 only

C.

1, 2, and 3 only

D.

1, 2, and 4 only

Full Access
Question # 61

Which of the following is most important for an internal auditor to check with regard to the database version?

A.

Verify whether the organization uses the most recent database software version

B.

Verify whether the database software version is supported by the vendor.

C.

Verify whether the database software version has been recently upgraded

D.

Verify whether access to database version information is appropriately restricted

Full Access
Question # 62

Which of the following financial instruments should be recorded at fair market value on the financial statements?

A.

Accounts receivable in the short term

B.

Bonds to be held to maturity.

C.

Notes receivable in the short term

D.

Bonds to be held for sale in the short term.

Full Access
Question # 63

Which of the following is likely to occur when an organization decides to adopt a decentralized organizational structure?

A.

A slower response to external change.

B.

Less controlled decision making.

C.

More burden on higher-level managers.

D.

Less use of employees' true skills and abilities.

Full Access
Question # 64

Which of me following is true of matrix organizations?

A.

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager

B.

A combination of product and functional departments allows management lo utilize personnel from various functions

C.

Authority responsibility and accountability of the units involved may vary based on the project's life, or the organization's culture

D.

It is best suited for firms with scattered locations or for multi-lira. large-scale firms

Full Access
Question # 65

According to MA guidance on IT. which of the following best describes a logical access control?

A.

Require complex passwords to be established and changed quarterly

B.

Require swipe cards to control entry into secure data centers

C.

Monitor access to the data center with closed circuit camera surveillance.

D.

Maintain current role definitions to ensure appropriate segregation of duties

Full Access
Question # 66

Which of the following IT controls includes protection for mainframe computers and workstations?

A.

Change management controls

B.

Physical and environmental controls.

C.

System software controls

D.

Organization and management controls

Full Access
Question # 67

Which of the following types of analytics focuses less on analysis and more on condensing data into mote meaningful pieces of information?

A.

Diagnostic analytics

B.

Descriptive analytics

C.

Prescriptive analytics

D.

Predictive analytics

Full Access
Question # 68

According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?

A.

individual workstation computer controls are not as important as companywide server controls.

B.

Particular attention should be paid to housing workstations away from environmental hazards.

C.

Cybersecurity issues can be controlled at an enterprise level making workstation level controls

redundant

D.

With security risks near an all-time high workstations should not be connected to the company network

Full Access
Question # 69

An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?

A.

Normalize the data

B.

Obtain the data

C.

identify the risks

D.

Analyze the data

Full Access
Question # 70

Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?

A.

Whether customers are asked to renew their consent for their data processing at least quarterly.

B.

Whether private data is processed in accordance with the purpose for which the consent was obtained.

C.

Whether the organization has established explicit and entitywide policies on data transfer to third parties.

D.

Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.

Full Access
Question # 71

Which of the following controls would be the most effective in preventing the disclosure of an organization’s confidential electronic information?

A.

Non-disclosure agreements between the firm and its employees

B.

Logs of user activity within the information system

C.

Two-factor authentication for access into the information system

D.

Limited access to information based on employee duties

Full Access
Question # 72

Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?

A.

Predictive analytics

B.

Prescriptive analytics

C.

Descriptive analytics

D.

Diagnostic analytics

Full Access
Question # 73

Which of the following characteristics applies to an organization that adopts a flat structure?

A.

The structure is dispersed geographically.

B.

The hierarchy levels are more numerous.

C.

The span of control is wide.

D.

The lower-level managers are encouraged to exercise creativity when solving problems.

Full Access