When determining the level of physical controls required for a workstation, which of the following factors should be considered?
A company records income from an investment in common stock when it does which of the following?
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Which of the following data privacy concerns can be attributed specifically to blockchain technologies?
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?
In an organization with a poor control environment, which of the following indicators would help an internal audit function measure its ability to provide risk-based assurance?
A chief audit executive (CAE) is calculating the available internal audit resource hours while planning the annual internal audit plan. The CAE needs to calculate the total number of hours available for audits. Which of the following should be deducted in order to have time available only for engagements?
In a final audit report, internal auditors drafted the following management action plan with a due date of the last day of the calendar year:
"Plan: A bank reconciliation template has been updated to address issues with formulas incorrectly calculating variances."
Which critical element of the action plan is missing?
Which of the following storage options would give the organization the best chance of recovering data?
Which of the following statements distinguishes a router from a typical switch?
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
Which of the following differentiates a physical access control from a logical access control?
Which of the following statements regarding the necessary resources to achieve the internal audit plan is true?
Which observations should the chief audit executive include in the executive summary of the final engagement communication?
Which of the following is a distinguishing feature of managerial accounting, which is not applicable to financial accounting?
Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?
Which of the following describes the primary advantage of using data analytics in internal auditing?
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
Which of the following statements is true regarding the management-by-objectives (MBO) approach?
The sole internal auditor of a municipality wants to implement proper supervision over internal audit workpapers. Which of the following would be the most appropriate?
Which of the following statements is true regarding a bring-your-own-device (BYOD) environment?
The chief audit executive (CAE) and management of the area under review disagree over managing a significant risk item. According to IIA guidance, which of the following actions should the CAE take first?
Which approach should a chief audit executive take when preparing the internal audit plan?
Senior management of a dairy organization asks the internal audit function to undertake an advisory service within the finance function and the internal audit function subsequently issues a report. Which of the following is aligned with IIA guidance on monitoring the results of such an engagement?
An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?
A company produces water buckets with the following costs per bucket:
Direct labor = 82
Direct material = $5
Fixed manufacturing = 83.50
Variable manufacturing = 82.50
The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.
Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
An organization's board of directors is particularly focused on positioning, the organization as a leader in the industry and beating the competition. Which of the following strategies offers the greatest alignment with the board's focus?
What is the primary purpose of an integrity control?
What is the first step an internal audit function should take to define its organizational structure, deliverables, communication protocols, and resourcing model?
A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?
Employees of an organization noticed that an exterior surface of the office building was deteriorating. Upon investigation, it was found that the deterioration was caused by harsh cleaning chemicals used to remove excessive bird droppings, and that the birds were drawn to the building to feed from a spider infestation. Which of the following best represents a root cause-based recommendation for this situation?
Which of the following intangible assets is considered to have an indefinite life?
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
Which of the following business practices promotes a culture of high performance?
Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?
Which of the following should the chief audit executive agree upon with the board before starting an external assessment of the internal audit function?
Which of the following is a likely result of outsourcing?
Which of the following best describes a potential benefit of using data analyses?
Which of the following best explains why an organization would enter into a capital lease contract?
The internal audit function is instructed by the audit committee to assess and give an opinion annually on risk management process effectiveness. However, lacking in-house expertise, the chief audit executive (CAE) initially appoints an independent consultant to assist with this engagement. Which of the following approaches is the most appropriate?
Which of the following best explains the matching principle?
Which of following best demonstrates the application of the cost principle?
Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
When should the results of internal quality assessments be communicated to senior management and the board?
Which of the following statements is true regarding an organization's chief audit executive (CAE) when prioritizing the audit universe?
An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?
Which of the following would most likely serve as a foundation for individual operational goats?
Which of the following statements is true concerning the basic accounting treatment of a partnership?
The chief audit executive (CAE) identified an unacceptable risk and believes that the risk is not being mitigated to an acceptable level. Which of the following is the CAE's next step in this situation?
Which of the following types of data analytics would be used by a hospital to determine which patients are likely to require readmittance for additional treatment?
After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.
Which of the following is the most likely control weakness demonstrated by the seller?
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
A new chief audit executive (CAE) reviews long overdue audit recommendations, which have been repeatedly reported to senior management but have not been implemented, and is unsure which issues should be escalated to the board. Which of the following would serve as the best guide in this scenario?
While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?
Which of the following scenarios would cause a chief audit executive (CAE) to immediately discontinue using any statements that would indicate conformance with the Global Internal Audit Standards in an audit report?
Which of the following Issues would be a major concern for internal auditors when using a free software to analyze a third-party vendor's big data?
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
Which of the following is a systems software control?
An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?
At an organization that uses a periodic inventory system, the accountant accidentally understated the organization s beginning inventory. How would the accountant's accident impact the income statement?
Which of the following biometric access controls uses the most unique human recognition characteristic?
Which of the following performance measures disincentives engaging in earnings management?
Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?
An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
In accounting, which of the following statements is true regarding the terms debit and credit?
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?
An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
The finance department of an organization recently undertook an asset verification exercise. The internal audit function scheduled a review of the IT department’s operations, which includes verifying the existence of computers distributed and their assignment. Can the internal audit function consider relying on the asset verification work performed by the finance department?
As part of internal audit's risk assessment, a chief audit executive is determining certain factors as part of planning the areas to audit within an organization that makes silicon chips. Which of the following would be considered a subjective factor as part of the risk assessment?
Which of the following is improved by the use of smart devices?
Which of the following would be the strongest control to prevent unauthorized wireless network access?
Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?
An internal audit engagement team found that the risk register of the project under review did not include significant risks identified by the internal audit function. The project manager explained that risk register preparations are facilitated by risk managers and that each project’s risk review follows the same set of questions. Which of the following recommendations will likely add the greatest value to the project management process of the organization?
An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?
A chief audit executive (CAE) joined an organization in the middle of the financial year. A risk-based annual audit plan has been approved by the board and is already underway. However, after discussions with key stakeholders, the CAE realizes that some significant key risk areas have not been covered in the original audit plan. How should the CAE respond?
After auditing the treasury function, the internal audit team issued a final report, which included an action plan agreed with management. When the audit team returned three months later to follow up on the action plan, management indicated that the plan had not been implemented because the old treasury system was being replaced with a new system. Which of the following is the most appropriate audit response?
Which of the following is the starting point for a chief audit executive to prioritize engagements to be included in the internal audit plan?
An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety

The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
An internal auditor discusses user-defined default passwords with the database administrator. Such passwords will be reset as soon as the user logs in for the first time, but the initial value of the password is set as "123456." Which of the following are the auditor and the database administrator most likely discussing in this situation?
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
Which of the following principles is shared by both hierarchical and open organizational structures?
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
A supervisor's span of control should not exceed seven subordinates.
Responsibility should be accompanied by adequate authority.
Employees at all levels should be empowered to make decisions.
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
Which of the following techniques would best detect an inventory fraud scheme?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
According to Maslow's hierarchy of needs theory, which of the following would likely have the most impact on retaining staff, if their lower-level needs are already met?
Which of the following is an example of two-factor authentication?
Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?
The chief audit executive hired a consultant to update the internal audit function’s methodologies. Which of the following would best ensure that the internal audit function will adhere to the updated methodologies?
An internal auditor was asked to review an equal equity partnership. In one sampled transaction, Partner A transferred equipment into the partnership with a self-declared value of $10,000, and Partner B contributed equipment with a self-declared value of $15,000. The capital accounts of each partner were subsequently credited with $12,500. Which of the following statements is true regarding this transaction?
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?
According to IIA guidance, which of the following statements is true regarding penetration testing?
Which of the following is a characteristic of using a hierarchical control structure?
Which of the following IT disaster recovery plans includes a remote site designated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
An internal auditor is reviewing the sales and collections processes of an e-commerce organization that is facing budget constraints. The auditor found that the accountant did not perform reconciliations of cash collections in a timely manner. The auditor determined that the reason was timing errors in the interfacing process between the customer payments portal and the accounting system. The current customer payments portal was recently implemented to replace a legacy system. The finance manager is in charge of the customer payments portal. Which of the following recommendations is the most appropriate to address the root cause of this deficiency?
Which of the following is a characteristic of big data?
According to Maslow’s hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
Which of the following is considered a physical security control?
According to I1A guidance on IT. which of the following activities regarding information security Is most likely to be the responsibility of line management as opposed to executive management, internal auditors, or the board?
Which of the following IT-related activities is most commonly performed by the second line of defense?
A new clerk in the managerial accounting department applied the high-low method and computed the difference between the high and low levels of maintenance costs. Which type of maintenance costs did the clerk determine?
Which of the following is an indicator of liquidity that is more dependable than working capital?
An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
An organization suffered significant damage to its local: file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor. Which of the following approaches has been used by the organization?
Which of the following is classified as a product cost using the variable costing method?
1. Direct labor costs.
2. Insurance on a factory.
3. Manufacturing supplies.
4. Packaging and shipping costa.
Which of the following describes the most appropriate set of tests for auditing a workstation’s logical access controls?
An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?
When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
An internal auditor is assessing the risks related to an organization’s mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal auditor be most concerned about?
An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?
Which of the following is a benefit from the concept of Internet of Things?
Which of the following scenarios would require the chief audit executive (CAE) to change the internal audit plan and seek approval for the changes from the board?
With regard to project management, which of the following statements about project crashing Is true?
Which of the following key performance indicators would serve as the best measurement of internal audit innovation?
Which of the following statements is true regarding activity-based costing (ABC)?
Which of the following statements is true regarding the capital budgeting procedure known as the discounted payback period?
Which of the following describes a mechanistic organizational structure?
An internal auditor discovered that the organization was not in full compliance with a regulatory labeling requirement for one of its products. The responsible manager indicated that the current product labeling has been in use for several years without any problems. If discovered, this regulatory breach could result in significant fines for the organization. What should be the chief audit executive's next course of action?
The engagement supervisor prepares the final engagement communication for dissemination. Since the chief audit executive (CAE) is on leave, the supervisor is delegated to disseminate the final engagement communication to all relevant parties. Who should be accountable for the final engagement communication?
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?
Which of the following best describes the type of control provided by a firewall?
According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?
A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:
“Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.” The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?
An analytical model determined that on Friday and Saturday nights the luxury brands stores should be open for extended hours and with a doubled number of employees
present; while on Mondays and Tuesdays costs can be minimized by reducing the number of employees to a minimum and opening only for evening hours Which of the
following best categorizes the analytical model applied?
The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?
Which of the following statements is true regarding data backup?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
Which of the following scenarios indicates an effective use of financial leverage?