Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following scenarios would cause a chief audit executive (CAE) to immediately discontinue using any statements that would indicate conformance with the Global Internal Audit Standards in an audit report?

A.

The internal audit function used a risk-based approach to create the internal audit plan

B.

The engagement supervisor considered requests from senior management regarding engagements to include in the internal audit plan

C.

The CAE only accepted engagements that the internal audit function collectively had the knowledge to perform

D.

The activity under review restricted the internal audit function's ability to access records, impacting the audit results

Which of the following would most likely serve as a foundation for individual operational goats?

A.

Individual skills and capabilities.

B.

Alignment with organizational strategy.

C.

Financial and human resources of the unit.

D.

Targets of key performance indicators

Which of the following storage options would give the organization the best chance of recovering data?

A.

Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.

B.

Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.

C.

Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.

D.

Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.

With regard to project management, which of the following statements about project crashing Is true?

A.

It leads to an increase in risk and often results in rework.

B.

It is an optimization technique where activities are performed in parallel rather than sequentially.

C.

It involves a revaluation of project requirements and/or scope.

D.

It is a compression technique in which resources are added so the project.

IT governance begins with which of the following activities?

A.

Identification of risk-mitigating options.

B.

Definition of IT objectives.

C.

Identification of IT risk events.

D.

Definition of risk response policies.

Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?

A.

Deploys data visualization tool.

B.

Adopt standardized data analysis software.

C.

Define analytics objectives and establish outcomes.

D.

Eliminate duplicate records.

In an organization that produces chocolate, the leadership team decides that the organization will open a milk production facility for its milk chocolate. Which of the following strategies have the organization chosen?

A.

Vertical integration.

B.

Unrelated diversification.

C.

Differentiation

D.

Focus

Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?

A.

At the value agreed upon by the partners.

B.

At book value.

C.

At fair value

D.

At the original cost.

Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?

A.

Scope change requests are reviewed and approved by a manager with a proper level of authority.

B.

Cost overruns are reviewed and approved by a control committee led by the project manager.

C.

There is a formal quality assurance process to review scope change requests before they are implemented

D.

There is a formal process to monitor the status of the project and compare it to the cost baseline

When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?

A.

The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes.

B.

The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion.

C.

The risk that database administrators set up personalized accounts for themselves, making the audit time consuming.

D.

The risk that database administrators could make hidden changes using privileged access.

Which of the following describes a mechanistic organizational structure?

A.

Primary direction of communication tends to be lateral.

B.

Definition of assigned tasks tends to be broad and general.

C.

Type of knowledge required tends to be broad and professional.

D.

Reliance on self-control tends to be low.

Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?

A.

Boundary defense

B.

Malware defense.

C.

Penetration tests

D.

Wireless access controls

Which of the following best describes meaningful recommendations for corrective actions?

A.

Recommendations that address the gap between the condition and consequence and provide at least short-term fixes

B.

Recommendations that address the gap between the criteria and condition and provide at least short-term fixes

C.

Recommendations that address the gap between the criteria and consequence and provide long-term solutions

D.

Recommendations that address the gap between the criteria and condition and provide long-term solutions

According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?

A.

Relationship with supervisor

B.

Salary

C.

Security.

D.

Achievement

Which of the following would be most likely included in the internal audit procedures manual?

A.

The internal audit charter

B.

The annual audit plan

C.

The engagement results

D.

The quality assurance and improvement program