After completing an assurance engagement, the chief audit executive (CAE) concludes that management has accepted a level of risk that may be unacceptable to the
organization. What is the most appropriate first step for the CAE to take?
Which of the following are advantages of flowcharts over internal control questionnaires''
1 Flowcharts reduce the need to test whether employees are observing internal control processes
2 Flowcharts provide a visual depiction of the processes in the area under review 3. Flowcharts identify and prioritize internal control design weaknesses.
4 Flowcharts highlight the control points to help internal auditors evaluate control design
The audit committee has asked the chief audit executive (CAE) to conduct an ad hoc forensic investigation of the purchasing department within a month due to the significance and urgency of a recently discovered risk The internal audit activity currently has no available staff with relevant experience or qualifications Which of the following is the CAE's best option for fulfilling the internal audit activity's responsibilities in this case?
According to IIA guidance, which of the following actions might place the independence of the internal audit function in jeopardy?
Which of the following is one of the five attributes that internal auditors include when documenting a deficiency?
An internal auditor is asked to perform an assurance engagement in the organization's newly acquired subsidiary When developing the objectives tor the engagement which ot the following statements describes the most important items that the auditor needs to consider?
According to IIA guidance, when of the Mowing statements is true regarding an engagement supervisor's use of review notes?
When setting the scope for the identification and assessment of key risks and controls in a process, which of the following would be the least appropriate approach?
Which of the following should be included in a privacy audit engagement?
1. Assess the appropriateness of the information gathered.
2. Review the methods used to collect information.
3. Consider whether the information collected is in compliance with applicable laws.
4. Determine how the information is stored.
How do internal auditors generally determine the priority of the areas within the engagement scope?