Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

After completing an assurance engagement, the chief audit executive (CAE) concludes that management has accepted a level of risk that may be unacceptable to the

organization. What is the most appropriate first step for the CAE to take?

A.

Discuss the issue with senior management.

B.

Discuss the issue only with the CEO.

C.

Inform the board.

D.

Discuss the issue with the members of management responsible for the risk area.

Which of the following are advantages of flowcharts over internal control questionnaires''

1 Flowcharts reduce the need to test whether employees are observing internal control processes

2 Flowcharts provide a visual depiction of the processes in the area under review 3. Flowcharts identify and prioritize internal control design weaknesses.

4 Flowcharts highlight the control points to help internal auditors evaluate control design

A.

1 and 3 only

B.

2 and 4 only.

C.

1.2. and 3 only

D.

2. 3 and 4 only

The audit committee has asked the chief audit executive (CAE) to conduct an ad hoc forensic investigation of the purchasing department within a month due to the significance and urgency of a recently discovered risk The internal audit activity currently has no available staff with relevant experience or qualifications Which of the following is the CAE's best option for fulfilling the internal audit activity's responsibilities in this case?

A.

Outsource the investigation to independent professional consultants

B.

Select certain internal auditors and remove them from their current assignments so that they can begin a forensic investigation course

C.

Recruit additional internal auditors possessing relevant qualification and experience

D.

Decline the engagement at this time

According to IIA guidance, which of the following actions might place the independence of the internal audit function in jeopardy?

A.

Having no active role or involvement in the risk management process.

B.

Auditing the risk management process for reasonableness.

C.

Coordinating and managing the risk management process.

D.

Participating with management in identifying and evaluating risks.

Which of the following is one of the five attributes that internal auditors include when documenting a deficiency?

A.

The criteria used to make the evaluation

B.

The methodology used to analyze data

C.

The proposed follow-up engagement work to be performed

D.

The scope of work performed during the engagement

An internal auditor is asked to perform an assurance engagement in the organization's newly acquired subsidiary When developing the objectives tor the engagement which ot the following statements describes the most important items that the auditor needs to consider?

A.

Previous performance of the subsidiary specifically its financial results over the last three years and the outcome of external audit reviews

B.

The results of previous internal audits of the subsidiary the recommendations provided and whether the recommended actions have been implemented

C.

Organizational strategy objectives, risks, control framework and the expectations of stakeholders regarding the audit

D.

The qualifications and competencies of the subsidiary's management team and their understanding of risk and control

According to IIA guidance, when of the Mowing statements is true regarding an engagement supervisor's use of review notes?

A.

The engagement supervisor's review notes should be retained m the final documental or even after they are addressed.

B.

The engagement supervisor's review notes cannot be used as evidence of engagement supervision

C.

The engagement supervisor's review notes could be cleared from all final documentation after they are addressed

D.

The engagement supervisor's review notes must be maintained in a checklist separate from tie final documentation

When setting the scope for the identification and assessment of key risks and controls in a process, which of the following would be the least appropriate approach?

A.

Develop the scope of the audit based on a bottom-up perspective to ensure that all business objectives are considered.

B.

Develop the scope of the audit to include controls that are necessary to manage risk associated with a critical business objective.

C.

Specify that the auditors need to assess only key controls, but may include an assessment of non-key controls if there is value to the business in providing such assurance.

D.

Ensure the audit includes an assessment of manual and automated controls to determine whether business risks are effectively managed.

Which of the following should be included in a privacy audit engagement?

1. Assess the appropriateness of the information gathered.

2. Review the methods used to collect information.

3. Consider whether the information collected is in compliance with applicable laws.

4. Determine how the information is stored.

A.

1 and 3 only

B.

2 and 4 only

C.

1, 3, and 4 only

D.

1, 2, 3, and 4

How do internal auditors generally determine the priority of the areas within the engagement scope?

A.

By calculating the period of time when the area was last audited try internal auditors

B.

By totaling the monetary value of the processes within the organization in the scope of the engagement

C.

By counting the number of red flags indicating the potential fraudulent activities within the area.

D.

By estimating the likelihood of a risks occurring and the potential impact of that risk on the organization