Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety

The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?

A.

Average cost method

B.

First-in, first-out (FIFO) method

C.

Specific identification method

D.

Activity-based costing method

Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?

A.

Anti-malware software

B.

Authentication

C.

Spyware

D.

Rooting

An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?

A.

It is particularly helpful to management when the organization is facing rapid change.

B.

It is a more successful approach when adopted by mechanistic organizations.

C.

It is mere successful when goal setting is performed not only by management, but by all team members, including lower-level staff.

D.

It is particularly successful in environments that are prone to having poor employer-employee relations.

Which of the following network types should an organization choose if it wants to allow access only to its own personnel?

A.

An extranet

B.

A local area network

C.

An Intranet

D.

The internet

Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?

A.

A warm recovery plan.

B.

A cold recovery plan.

C.

A hot recovery plan.

D.

A manual work processes plan

An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?

A.

The auditor is normalizing data in preparation for analyzing it.

B.

The auditor is analyzing the data in preparation for communicating the results,

C.

The auditor is cleaning the data in preparation for determining which processes may be involves .

D.

The auditor is reviewing trio data prior to defining the question

Which of the following statements is true regarding data backup?

A.

System backups should always be performed real time.

B.

Backups should be stored in a secured location onsite for easy access.

C.

The tape rotation schedule affects how long data is retained

D.

Backup media should be restored only m case of a hardware or software failure

According to IIA guidance, which of the following links computers and enables them to -communicate with each other?

A.

Application program code

B.

Database system

C.

Operating system

D.

Networks

Which of the following responsibilities would ordinary fall under the help desk function of an organization?

A.

Maintenance service items such as production support.

B.

Management of infrastructure services, including network management.

C.

Physical hosting of mainframes and distributed servers

D.

End-to -end security architecture design.

Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic data interchange (EDI)?

A.

A just-in-time purchasing environment

B.

A large volume of custom purchases

C.

A variable volume sensitive to material cost

D.

A currently inefficient purchasing process

Which of the following application controls is the most dependent on the password owner?

A.

Password selection.

B.

Password aging.

C.

Password lockout.

D.

Password rotation.

While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?

A.

Review the call center script used by customer service agents to interact with callers, and update the script if necessary.

B.

Be-emphasize the importance of call center employees completing a certain number of calls per hour.

C.

Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.

D.

Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily

How do data analysis technologies affect internal audit testing?

A.

They improve the effectiveness of spot check testing techniques

B.

They allow greater insight into high-risk areas

C.

They reduce the overall scope of the audit engagement

D.

They increase the internal auditor’s objectivity

During which phase of the contracting process are contracts drafted for a proposed business activity?

A.

Initiation phase.

B.

Bidding phase.

C.

Development phase.

D.

Management phase.

According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?

A.

Salary and status.

B.

Responsibility and advancement.

C.

Work conditions and security.

D.

Peer relationships and personal life.