Free Certified Internal Auditor-Internal Audit Knowledge Elements Exam IIA-CIA-Part3 Exam Practice Test

UNLOCK FULL
IIA-CIA-Part3 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 5
Total Questions: 0
  • Which of following best demonstrates the application of the cost principle?

    Answer: B Next Question
  • Which of the following items best describes the strategy of outsourcing?

    Answer: A Next Question
  • Which of the following scenarios best illustrates a spear phishing attack?

    Answer: C Next Question
  • Which of the following statements is true regarding the term "flexible budgets" as it is used in accounting?

    Answer: D Next Question
  • Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?

    Answer: C Next Question
  • An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?

    Answer: B Next Question
  • An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?

    Answer: A Next Question
  • An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internalAuditor be most concerned about?

    Answer: A Next Question
  • A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?

    Answer: D Next Question
  • A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?

    Answer: B Next Question
Page: 1 / 5
Total Questions: 0