During the second half of the audit year, the chief audit executive (CAE) identified significant negative variances to the approved audit budget required to complete the internal audit plan. Which of the following actions should the CAE take?
A small chain of grocery stores made a reporting error and understated its ending inventory. What effect would this have on the income statement for the following year?
Which of the following statements depicts a valid role of the internal audit function in ensuring the effectiveness of management action plans?
Which of the following would be most likely found in an internal audit procedures manual?
Which of the following key performance indicators would serve as the best measurement of internal audit innovation?
Which of the following data privacy concerns can be attributed specifically to blockchain technologies?
To achieve conformance with the Global Internal Audit Standards, the chief audit executive must include which of the following activities in the quality assurance and improvement program (QAIP)?
An organization's technician was granted a role that enables him to prioritize projects throughout the organization. Which type of authority will the technician most likely be exercising?
After auditing the treasury function, the internal audit team issued a final report, which included an action plan agreed with management. When the audit team returned three months later to follow up on the action plan, management indicated that the plan had not been implemented because the old treasury system was being replaced with a new system. Which of the following is the most appropriate audit response?
The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
1. Favorable labor efficiency variance.
2. Adverse labor rate variance.
3. Adverse labor efficiency variance.
4. Favorable labor rate variance.
Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?
An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?
Which of the following documents would provide an internal auditor with information on the length of time to maintain documents after the completion of an engagement?
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
Which of the following is a key performance indicator of the efficiency of the internal audit function?
An internal auditor has completed the fieldwork of an assurance engagement on the organization's business continuity. The most significant finding is that business requirements were left up to the IT function to decide and implement. As a result, the time to recovery for some critical systems following a disruption is too long, while recovery time of non-critical systems is needlessly prioritized at a significant cost. Which of the following is the most appropriate recommendation to include in the engagement report?
Which of the following best describes a transformational leader, as opposed to a transactional leader?
Which of the following measures the operating success of a company for a given period of time?
Employees of an organization noticed that an exterior surface of the office building was deteriorating. Upon investigation, it was found that the deterioration was caused by harsh cleaning chemicals used to remove excessive bird droppings, and that the birds were drawn to the building to feed from a spider infestation. Which of the following best represents a root cause-based recommendation for this situation?
Which of the following types of accounts must be closed at the end of the period?
An internal auditor discovered that the organization was not in full compliance with a regulatory labeling requirement for one of its products. The responsible manager indicated that the current product labeling has been in use for several years without any problems. If discovered, this regulatory breach could result in significant fines for the organization. What should be the chief audit executive's next course of action?
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
Which of the following items represents a limitation with an impact the chief audit executive should report to the board?
A chief audit executive (CAE) is calculating the available internal audit resource hours while planning the annual internal audit plan. The CAE needs to calculate the total number of hours available for audits. Which of the following should be deducted in order to have time available only for engagements?
Which of the following contract concepts is typically given in exchange for the execution of a promise?
During the process of setting the annual audit plan, the chief audit executive receives a request from senior management to conduct an assurance engagement on the cybersecurity controls of the organization. Which of the following is a reason cybersecurity should be included in the annual internal audit plan?
During an internal audit engagement, numerous deficiencies in the organization's management of customer data were discovered, entailing the risk of breaching personal data protection legislation. An improvement plan was approved by senior management. Which of the following conditions observed during the periodic follow-up process best justifies the chief audit executive's decision to escalate the issue to the board?
Which of the following statements is true regarding an organization's chief audit executive (CAE) when prioritizing the audit universe?
Which of the following is an effective preventive control for data center security?
Which of the following is true regarding the use of remote wipe for smart devices?
Which of the following biometric access controls uses the most unique human recognition characteristic?
During a review of payments to supplier invoices, the internal auditor identified that the IT process allows invoice processing staff to ignore the auto-generated alert triggered when the invoice amount is different from the purchase order value. The manager explained that staff must be able to bypass the alert because of small differences in transport charges. Which of the following would be the most appropriate internal audit recommendation?
Which of the following is a necessary action for an internal audit function if senior management chooses not to take action to remediate the finding and accepts the risk?
Which of the following application controls is the most dependent on the password owner?
Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?
According to IIA guidance, which of the following are typical physical and environmental IT controls?
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
For employees, the primary value of implementing job enrichment is which of the following?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
Which of the following statements is true regarding the capital budgeting procedure known as the discounted payback period?
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?
Which of the following is classified as a product cost using the variable costing method?
Direct labor costs.
Insurance on a factory.
Manufacturing supplies.
Packaging and shipping costs.
The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
Favorable labor efficiency variance
Adverse labor rate variance
Adverse labor efficiency variance
Favorable labor rate variance
Which of the following statements best describes the current state of data privacy regulation?
Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?
According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?
A motivational technique generally used to overcome monotony and job-related boredom is:
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recovery solution?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?
Which of the following data security policies is most likely to be the result of a data privacy law?
Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?
An internal auditor is assessing the risks related to an organization’s mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal auditor be most concerned about?
An organization’s account for office supplies on hand had a balance of $9,000 at the end of year one. During year two, the organization recorded an expense for purchasing office supplies. At the end of year two, a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?
A new manager received computations of the internal rate of return regarding his project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
With regard to disaster recovery planning, which of the following would most likely involve stakeholders from several departments?
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?
With regard to project management, which of the following statements about project crashing Is true?
Which of the following is a primary driver behind the creation and prloritteation of new strategic Initiatives established by an organization?
Which of the following responsibilities would ordinary fall under the help desk function of an organization?
At one organization, the specific terms of a contract require both the promisor end promise to sign the contract in the presence of an independent witness.
What is the primary role to the witness to these signatures?
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?
According to lIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
According to IIA guidance, which of the following statements is true regarding analytical procedures?
An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?
For employees, the primary value of implementing job enrichment is which of the following?
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
Which of the following statements is true regarding the management-by-objectives method?
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?
Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Which of the following describes the most appropriate set of tests for auditing a workstation's logical access controls?
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?
According to Herzberg's Two-Factor Theory of Motivation, which of the following factors arc mentioned most often by satisfied employees?
Which of the following should be included in a data privacy poky?
1. Stipulations for deleting certain data after a specified period of time.
2. Guidance on acceptable methods for collecting personal data.
3. A requirement to retain personal data indefinitely to ensure a complete audit trail,
4. A description of what constitutes appropriate use of personal data.
Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
Which of the following is an advantage of a decentralized organizational structure, as opposed to a centralized structure?
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an Analytics tool to identify the top five vendors that received the highest sum of payments. Which of the following analytics techniques did the auditor apply?
The budgeted cost of work performed is a metric best used to measure which project management activity?
An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?
Which of the following controls is the most effective for ensuring confidentially of transmitted information?
According to The IIA's Three Lines Model, which of the following IT security activities is commonly shared by all three lines?
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?
Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?
An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
Which of the following intangible assets is considered to have an indefinite life?
In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?
Which of the following statements is true regarding activity-based costing (ABC)?
An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?
According to IIA guidance, which of the following statements is true regarding penetration testing?
Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?
If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?
An organization was forced to stop production unexpectedly, as raw materials could not be delivered due to a military conflict in the region. Which of the following plans have most likely failed to support the organization?
In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?
Which of the following is an example of a contingent liability that a company should record?
Following an evaluation of an organization's IT controls, an internal auditor suggested improving the process where results are compared against the input. Which of the following IT controls would the Internal auditor recommend?
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
In accounting, which of the following statements is true regarding the terms debit and credit?
Which of the following physical security controls is able to serve as both a detective and preventive control?
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Which of the following is an indicator of liquidity that is more dependable than working capital?
Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?
The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (lAArs) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA. Which of the following staffing approaches is the CAE most likely lo select?
Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?
A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?
An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?
An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?
Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?
Which of the following best describes the type of control provided by a firewall?
The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?