An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?
Decrease the transfer price.
Increase the transfer price.
Charge at the arm’s length price.
Charge at the optimal transfer price.
Comprehensive and Detailed In-Depth Explanation:
Transfer pricing refers to the pricing of goods, services, and intangibles transferred between related entities. In international transactions, companies often adjust transfer prices to minimize tax liabilities and import tariffs.
Decreasing the transfer price (Option A) results in a lower declared customs value, reducing import tariffs paid to the foreign country.
Increasing the transfer price (Option B) would raise import tariffs, making it less favorable.
Charging the arm’s length price (Option C) ensures compliance with tax regulations but does not necessarily reduce import tariffs.
Optimal transfer pricing (Option D) is a general term that does not specifically focus on reducing tariffs.
Thus, decreasing the transfer price is the best approach.
According to IIA guidance on IT, which of the following would be considered a primary control for a spreadsheet to help ensure accurate financial reporting?
Formulas and static data are locked or protected.
The spreadsheet is stored on a network server that is backed up daily.
The purpose and use of the spreadsheet are documented.
Check-in and check-out software is used to control versions.
Comprehensive and Detailed In-Depth Explanation:
Primary controls in spreadsheet management focus on ensuring data accuracy, integrity, and security.
Option A (Locking formulas and static data) prevents unauthorized changes, ensuring data integrity. This is a direct control over spreadsheet accuracy, making it the correct answer.
Option B (Backup storage) is an IT operational control, not a primary financial reporting control.
Option C (Documentation of spreadsheet use) is important for governance but does not directly prevent errors.
Option D (Version control software) helps manage changes but does not directly ensure financial reporting accuracy.
Thus, locking and protecting spreadsheet formulas is the most critical primary control for accurate financial reporting.
A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
Fixed and variable manufacturing costs are less than the special offer selling price
The manufacturer can fulfill the order without expanding the capacities of the production facilities
Costs related to accepting this offer can be absorbed through the sale of other products
The manufacturer’s production facilities are currently operating at full capacity
Which of the following IT-related activities is most commonly performed by the second line of defense?
Block unauthorized traffic.
Encrypt data.
Review disaster recovery test results.
Provide an independent assessment of IT security.
Comprehensive and Detailed In-Depth Explanation:
The Three Lines of Defense Model classifies risk management roles as follows:
First Line of Defense: Operational management responsible for risk controls (e.g., blocking unauthorized traffic, encrypting data).
Second Line of Defense: Risk management and compliance functions that monitor and assess the effectiveness of first-line controls (e.g., reviewing disaster recovery test results).
Third Line of Defense: Independent audit functions providing assurance (e.g., conducting security assessments).
Option C (Reviewing disaster recovery test results) aligns with the second line of defense because it involves oversight and evaluation of IT controls rather than direct execution.
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Hot recovery plan
Warm recovery plan
Cold plan
Absence of recovery plan
Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
High-yield bonds
Commodity-backed bonds
Zero-coupon bonds
Junk bonds
Comprehensive and Detailed In-Depth Explanation:
Zero-coupon bonds are issued at a discount to their face (par) value and do not pay periodic interest. Instead, the bond's value increases over time as it accrues interest, reaching its full face value at maturity. Investors receive the total payoff (the face value) upon maturity, which includes the initial investment plus the interest earned over the bond's term. High-yield bonds (also known as junk bonds) offer higher interest rates due to higher risk but pay periodic interest. Commodity-backed bonds are tied to commodity prices and may pay periodic interest. Therefore, zero-coupon bonds fit the described characteristics.
During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?
IT application-based controls
IT systems development controls
Environmental controls
IT governance controls
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software.
Updating operating software in a haphazard manner.
Applying a weak password for access to a mobile device.
Jailbreaking a locked smart device.
Comprehensive and Detailed In-Depth Explanation:
Jailbreaking a locked smart device (removing manufacturer-imposed restrictions) increases the risk of infringing on copyright and privacy laws, as it allows unauthorized access to software and applications.
Option A (Not installing anti-malware software) – Increases security risks but does not directly violate regulations.
Option B (Haphazard OS updates) – Can lead to vulnerabilities but is not a legal issue.
Option C (Weak passwords) – Poses a security threat but does not impact compliance with laws.
Since jailbreaking often violates software licenses and may lead to illegal use of software, Option D is the correct answer.
Which of the following is classified as a product cost using the variable costing method?
Direct labor costs.
Insurance on a factory.
Manufacturing supplies.
Packaging and shipping costs.
1 and 2
1 and 3
2 and 4
3 and 4
Comprehensive and Detailed In-Depth Explanation:
Under the variable costing method, only costs that vary directly with production volume are treated as product costs. This includes direct labor costs (the wages of employees directly involved in manufacturing) and manufacturing supplies (materials consumed during production). Insurance on a factory is a fixed overhead cost, and packaging and shipping costs are typically considered period costs or selling expenses, as they are incurred after production. Therefore, options 1 and 3 correctly represent product costs under variable costing.
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
Identify data anomalies and outliers
Define questions to be answered
Identify data sources available
Determine the scope of the data extract
According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?
Report identifying data that is outside of system parameters.
Report identifying general ledger transactions by time and individual.
Report comparing processing results with original input.
Report confirming that the general ledger data was processed without error.
Comprehensive and Detailed In-Depth Explanation:
A management (audit) trail ensures financial transparency by tracking who initiated, approved, and processed transactions within the general ledger (GL).
Option A (Report on data outside system parameters) is a validity control, not an audit trail.
Option C (Comparison of results with input) ensures accuracy but is not a comprehensive audit trail.
Option D (Error-free processing confirmation) does not track user activity.
Since audit trails require tracking transactions by time and individual, Option B is correct.
An internal auditor was asked to review an equal equity partnership. In one sampled transaction, Partner A transferred equipment into the partnership with a self-declared value of $10,000, and Partner B contributed equipment with a self-declared value of $15,000. The capital accounts of each partner were subsequently credited with $12,500. Which of the following statements is true regarding this transaction?
The capital accounts of the partners should be increased by the original cost of the contributed equipment.
The capital accounts should be increased using a weighted average based on the current percentage of ownership.
No action is necessary as the capital account of each partner was increased by the correct amount.
The capital accounts of the partners should be increased by the fair market value of their contribution.
Comprehensive and Detailed In-Depth Explanation:
Partnership contributions should be recorded at their fair market value (FMV) at the time of contribution, ensuring equitable financial representation.
Option A (Original cost of the equipment) – Not appropriate since the asset’s current fair value is relevant, not its historical cost.
Option B (Weighted average approach) – Not applicable; capital accounts should reflect actual contributed value.
Option C (No action necessary) – Incorrect because partners contributed assets of different values, making an equal capital credit unfair.
Since partnership accounting requires fair market value for capital accounts, Option D is correct.
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?
The auditor eliminated duplicate information
The auditor organized data to minimize useless information
The auditor made data usable for a specific purpose by ensuring that anomalies were identified and addressed
The auditor ensured data fields were consistent and that data could be used for a specific purpose
Which of the following lists is comprised of computer hardware only?
A central processing unit, a scanner, and a value-added network
A computer chip, a data warehouse, and a router
A server, a firewall, and a smartphone
A workstation, a modem, and a disk drive
Comprehensive and Detailed In-Depth Explanation:
Computer hardware refers to the physical components of a computer system.
Workstation: A high-performance computer designed for technical or scientific applications.
Modem: A device that modulates and demodulates signals for data transmission over communication lines.
Disk drive: A device that reads and/or writes data to a disk storage medium.
Option D lists only physical components, fitting the definition of computer hardware.
In contrast:
Value-added network (option A): A hosted service offering specialized networking services, not a physical component.
Data warehouse (option B): A system used for reporting and data analysis, representing a data storage concept rather than a physical device.
Firewall (option C): While it can be hardware, it is often implemented as software; thus, the term doesn't exclusively denote hardware.
Therefore, option D accurately represents a list of computer hardware components.
References:
The Institute of Internal Auditors. (n.d.). CIA Exam Syllabus. Retrieved from [https://www.theiia.org/en/certifications/cia
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
Tampering
Hacking
Phishing
Piracy
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
The business continuity management charter
The business continuity risk assessment plan
The business impact analysis plan
The business case for business continuity planning
According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?
Individual workstation computer controls are not as important as companywide server controls
Particular attention should be paid to housing workstations away from environmental hazards
Cybersecurity issues can be controlled at an enterprise level, making workstation-level controls redundant
With security risks near an all-time high, workstations should not be connected to the company network
Given the information below, which organization is in the weakest position to pay short-term debts?
Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000
Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000
Organization C: Current assets constitute $900,000; Current liabilities are $300,000
Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000
Organization A
Organization B
Organization C
Organization D
An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
Average cost method
First-in, first-out (FIFO) method
Specific identification method
Activity-based costing method
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
The auditor is normalizing data in preparation for analyzing it.
The auditor is analyzing the data in preparation for communicating the results.
The auditor is cleaning the data in preparation for determining which processes may be involved.
The auditor is reviewing the data prior to defining the question.
Comprehensive and Detailed In-Depth Explanation:
In data analytics, data cleaning involves identifying and correcting errors, inconsistencies, and redundancies in the dataset to ensure accuracy and reliability. By eliminating duplicate or irrelevant data, the internal auditor enhances the quality of the dataset, which is crucial for accurate analysis and risk assessment. This process is a preparatory step before analyzing the data to identify high-risk areas. Normalization (option A) refers to organizing data to reduce redundancy but is more specific to database design. Analyzing data (option B) and reviewing data prior to defining the question (option D) are steps that occur before and after data cleaning, respectively.
An organization has 1,000 units of a defective item in stock. Per unit, market price is $10; production cost is $4; and the defect selling price is $5. What is the carrying amount (inventory value) of defects at year-end?
$0
$4,000
$5,000
$10,000
Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?
Voice recognition and token
Password and fingerprint
Fingerprint and voice recognition
Password and token
Which of the following best explains why an organization would enter into a capital lease contract?
To increase the ability to borrow additional funds from creditors
To reduce the organization’s free cash flow from operations
To improve the organization’s free cash flow from operations
To acquire the asset at the end of the lease period at a price lower than the fair market value
Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?
Gain sharing
Commission
Profit sharing
Pension
Comprehensive and Detailed In-Depth Explanation:
Gain sharing is a compensation program where employees receive bonuses tied directly to the company's cost-saving measures and productivity improvements. This approach aligns employees' interests with organizational goals by rewarding them for identifying and implementing efficiencies that reduce costs. Unlike profit sharing, which is based on overall profitability, gain sharing focuses specifically on performance improvements that lead to cost savings. Commissions are typically related to sales performance, and pensions are long-term retirement benefits not directly linked to immediate cost-saving efforts. Therefore, gain sharing is the most indicative of targeting cost-saving objectives.
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recovery solution?
Data is synchronized in real time.
Recovery time is expected to be less than one week.
Servers are not available and need to be procured.
Recovery resources and data restore processes have been defined.
Comprehensive and Detailed In-Depth Explanation:
A cold site is a disaster recovery location that provides only basic infrastructure (e.g., power, cooling, and space) but does not have pre-installed IT systems. Organizations must procure and install servers before recovery can begin.
Option A (Real-time data synchronization) applies to hot sites, which maintain fully operational backup systems.
Option B (Recovery time under one week) is more characteristic of warm or hot sites, as cold sites require longer setup times.
Option D (Defined recovery processes) applies to all disaster recovery plans and does not differentiate cold sites.
Since a cold site lacks pre-installed servers, Option C is the correct answer.
Which of the following describes the primary advantage of using data analytics in internal auditing?
It helps support the internal audit conclusions with factual evidence.
It reduces the time and effort needed to prepare the audit report.
It helps prevent internal auditors from unknowingly disregarding key process risks.
It enables internal auditors to meet their responsibility for monitoring controls.
Comprehensive and Detailed In-Depth Explanation:
Data analytics in internal auditing provides quantitative, evidence-based insights, enhancing audit conclusions and decision-making.
Option B (Reduces report preparation time) – While efficiency is a benefit, the main advantage is improved accuracy and factual support.
Option C (Prevents overlooking risks) – While true, data analytics primarily strengthens evidence collection.
Option D (Monitoring controls) – Auditors assess controls, but data analytics enhances findings through data-driven validation.
Thus, Option A is correct, as data analytics strengthens audit conclusions with factual evidence.
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An extranet.
A local area network (LAN).
An intranet.
The internet.
Comprehensive and Detailed In-Depth Explanation:
An intranet is a private network used by an organization for internal communication and information sharing among employees. It is accessible only to authorized personnel within the company.
Option A (Extranet) – Allows external parties (e.g., suppliers, partners) to access limited information.
Option B (LAN) – Refers to a network infrastructure rather than controlled access.
Option D (Internet) – Is public and not restricted to internal personnel.
Thus, Option C (Intranet) is the correct answer as it ensures access only to organizational personnel.
Based on test results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Requested backup tapes were not returned from the offsite vendor in a timely manner
Returned backup tapes from the offsite vendor contained empty spaces
Critical systems have been backed up more frequently than required
Critical system backup tapes are taken off site less frequently than required
Which of the following is improved by the use of smart devices?
Version control
Privacy
Portability
Secure authentication
Comprehensive and Detailed In-Depth Explanation:
Smart devices often incorporate advanced security features that enhance secure authentication mechanisms. These features may include biometric sensors (such as fingerprint readers or facial recognition), hardware tokens, and secure enclaves that store authentication credentials. By utilizing these technologies, smart devices provide robust methods to verify user identities, thereby strengthening access controls to sensitive information and systems. While smart devices do offer portability (option C), their primary contribution to security lies in enhancing authentication processes. Version control (option A) pertains to managing changes in software or documents and is not directly impacted by smart devices. Privacy (option B) can be influenced by smart devices, but the direct improvement is in secure authentication, which in turn can support privacy protections.
Which of the following statements best describes the current state of data privacy regulation?
Regulations related to privacy are evolving and complex, and the number of laws is increasing
Most privacy laws are prescriptive and focused on organizations’ privacy rights
The concept of data privacy is well established, privacy regulations are mature, and minimal regulatory changes are expected
Because the concept of privacy is different around the world, data privacy is relatively unregulated
A new manager received computations of the internal rate of return regarding his project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Compare to the annual cost of capital.
Compare to the annual interest rate.
Compare to the required rate of return.
Compare to the net present value.
Comprehensive and Detailed In-Depth Explanation:
The Internal Rate of Return (IRR) is the discount rate that makes the net present value (NPV) of a project equal to zero. It is used to evaluate the profitability of investments.
Option A (Annual cost of capital) – While related, the IRR should be compared directly to the required rate of return (hurdle rate).
Option B (Annual interest rate) – Not always relevant, as the cost of borrowing may differ from the required return on investments.
Option D (Compare to NPV) – NPV is a different method of capital budgeting; while related, it is not used for direct comparison with IRR.
Since the IRR is accepted if it meets or exceeds the required rate of return, Option C is correct.
Which of the following is a likely result of outsourcing?
Increased dependence on suppliers.
Increased importance of market strategy.
Decreased sensitivity to government regulation
Decreased focus on costs
Understanding Outsourcing and Its Impact:
Outsourcing refers to contracting external vendors to handle business functions that were previously managed in-house.
While it can reduce costs and improve efficiency, it increases reliance on external suppliers for critical services.
Why Increased Dependence on Suppliers is the Most Likely Result:
Loss of Internal Control: Companies lose direct oversight over quality, delivery times, and operational processes, depending on the supplier’s performance.
Risk of Supplier Disruptions: If the supplier faces financial difficulties, operational failures, or compliance issues, the outsourcing company is directly affected.
Vendor Lock-in: Over time, switching suppliers becomes difficult due to integration costs and proprietary dependencies.
Why Other Options Are Incorrect:
B. Increased importance of market strategy – Incorrect.
While outsourcing can free up resources to focus on core business strategy, it does not necessarily increase the importance of market strategy.
C. Decreased sensitivity to government regulation – Incorrect.
Outsourcing often increases regulatory risks, as companies must ensure third-party compliance with data protection, labor laws, and industry regulations.
D. Decreased focus on costs – Incorrect.
Outsourcing is typically done to reduce costs, not decrease cost focus. Organizations still monitor costs closely to ensure vendor contracts remain cost-effective.
IIA’s Perspective on Outsourcing and Risk Management:
IIA Standard 2120 – Risk Management requires internal auditors to evaluate risks associated with outsourcing.
IIA GTAG (Global Technology Audit Guide) on Third-Party Risk Management highlights risks related to supplier dependence, service quality, and compliance.
COSO ERM Framework recommends ongoing supplier performance monitoring to mitigate risks of over-dependence.
IIA References:
IIA Standard 2120 – Risk Management & Vendor Oversight
IIA GTAG – Third-Party Risk Management
COSO ERM – Managing Outsourcing Risks
Thus, the correct and verified answer is A. Increased dependence on suppliers.
Which of the following would be a concern related to the authorization controls utilized for a system?
Users can only see certain screens in the system.
Users are making frequent password change requests.
Users Input Incorrect passwords and get denied system access
Users are all permitted uniform access to the system.
Authorization controls ensure that users have appropriate access levels based on their roles and responsibilities. The primary concern arises when all users have uniform access, as it violates the principle of least privilege (PoLP) and increases the risk of unauthorized access and data breaches.
(A) Users can only see certain screens in the system.
Incorrect. This is a good security practice, as it limits user access based on job roles, preventing unauthorized access to sensitive information.
(B) Users are making frequent password change requests.
Incorrect. Frequent password resets might indicate poor password management but are not directly related to authorization controls.
(C) Users input incorrect passwords and get denied system access.
Incorrect. This indicates authentication issues, not an authorization control concern. If users are denied access due to incorrect passwords, the system’s authentication mechanisms are working correctly.
(D) Users are all permitted uniform access to the system. ✅
Correct. Authorization should be role-based, meaning different users should have different levels of access depending on their responsibilities. Uniform access violates security best practices and increases the risk of fraud, data misuse, and compliance violations.
IIA GTAG "Identity and Access Management" emphasizes that authorization controls should be based on job functions to prevent unnecessary exposure to sensitive data.
IIA Standard 2120 – Risk Management highlights the importance of access control policies to mitigate cybersecurity risks.
IIA GTAG – "Identity and Access Management"
IIA Standard 2120 – Risk Management
COBIT Framework – Access Control and Identity Management
Analysis of Answer Choices:IIA References:Thus, the correct answer is D, as uniform access across all users is a major security concern in authorization control.
An organization that soils products to a foreign subsidiary wants to charge a price that wilt decrease import tariffs. Which of the following is the best course of action for the organization?
Decrease the transfer price
Increase the transfer price
Charge at the arm's length price
Charge at the optimal transfer price
When selling products to a foreign subsidiary, pricing must comply with international tax laws and transfer pricing regulations.
Correct Answer (C - Charge at the Arm’s Length Price)
Arm’s length pricing ensures that transactions between related parties (e.g., parent company and subsidiary) are priced as if they were between unrelated entities.
This helps comply with tax regulations and avoid penalties for manipulating transfer prices to reduce import tariffs.
The OECD Transfer Pricing Guidelines and the IIA Practice Guide: Auditing Global Business Risks recommend using arm’s length pricing to ensure compliance with tax authorities.
Why Other Options Are Incorrect:
Option A (Decrease the transfer price):
Lowering the transfer price may reduce import tariffs but could violate tax laws, leading to legal and financial penalties.
Option B (Increase the transfer price):
Increasing prices may help shift profits but could trigger regulatory scrutiny and additional taxes.
Option D (Charge at the optimal transfer price):
"Optimal" pricing is vague and may not comply with legal transfer pricing standards.
IIA Practice Guide: Auditing Global Business Risks – Covers compliance with international tax and transfer pricing regulations.
OECD Transfer Pricing Guidelines – Establishes arm’s length pricing as the best practice.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because arm’s length pricing ensures compliance with tax regulations while minimizing tariff risks.
Which of the following is a systems software control?
Restricting server room access to specific individuals
Housing servers with sensitive software away from environmental hazards
Ensuring that all user requirements are documented
Performing of intrusion testing on a regular basis
System software controls refer to security measures and protocols that protect an organization's IT infrastructure from unauthorized access, cyber threats, and system failures. Intrusion testing (penetration testing) is a key system software control used to detect vulnerabilities in IT environments.
Correct Answer (D - Performing Intrusion Testing on a Regular Basis)
Intrusion testing is a critical system software security measure that helps identify weaknesses in software configurations and security defenses.
This falls under system software controls because it directly tests the security of operating systems, applications, and network software.
The IIA’s GTAG 11: Developing IT Security Audits highlights penetration testing as a necessary control for system software security.
Why Other Options Are Incorrect:
Option A (Restricting server room access to specific individuals):
This is a physical access control, not a system software control.
Option B (Housing servers away from environmental hazards):
This is an environmental control, focusing on disaster prevention rather than software security.
Option C (Ensuring that all user requirements are documented):
This relates to project documentation and system development, but it does not control software security.
IIA GTAG 11: Developing IT Security Audits – Recommends regular penetration testing as a system software control.
IIA Practice Guide: Auditing IT Security – Discusses system software security measures.
IIA References for Validation:Thus, D is the correct answer because intrusion testing is a core system software control ensuring security.
Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
High-yield bonds
Commodity-backed bonds
Zero coupon bonds
Junk bonds
A zero-coupon bond is a type of bond that sells at a discount from its face value and gradually increases in value over time until maturity when the bondholder receives the full face value. Unlike regular bonds, zero-coupon bonds do not pay periodic interest (coupons) but instead accumulate interest over the bond’s life.
Let’s analyze each option:
Option A: High-yield bonds
Incorrect.
High-yield bonds (junk bonds) offer higher interest rates due to higher risk but pay periodic interest rather than being sold at a discount and growing in value over time.
Option B: Commodity-backed bonds
Incorrect.
Commodity-backed bonds are linked to the price of a commodity (e.g., gold, oil) rather than increasing in value over time from an initial discount.
Option C: Zero coupon bonds
Correct.
These bonds are issued at a discount and increase in value each year as interest accrues.
The investor receives the full face value at maturity, which includes the principal and accumulated interest.
IIA Reference: Internal auditors evaluate investment risks, including bond valuation and discount amortization. (IIA Practice Guide: Auditing Investment and Treasury Functions)
Option D: Junk bonds
Incorrect.
Junk bonds are simply high-risk, high-yield bonds that pay interest periodically and do not necessarily sell at a deep discount.
Thus, the verified answer is C. Zero coupon bonds.
Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Requested backup tapes were not returned from the offsite vendor In a timely manner.
Returned backup tapes from the offsite vendor contained empty spaces.
Critical systems have boon backed up more frequently than required.
Critical system backup tapes are taken off site less frequently than required
Understanding IT Backup Risks in Disaster Recovery:
Disaster recovery plans rely on backup data to restore operations after a system failure.
An ineffective backup system increases the risk of data loss, operational downtime, and regulatory non-compliance.
Why Option B (Empty Backup Tapes) Is Correct?
If backup tapes contain empty spaces, it indicates data corruption or incomplete backups, leading to unrecoverable data loss in a disaster.
IIA GTAG 16 – Data Management and IT Auditing emphasizes that backups must be tested for integrity and completeness.
ISO 27001 and NIST SP 800-34 recommend periodic verification of backup data to prevent critical failures.
Why Other Options Are Incorrect?
Option A (Delayed return of backup tapes):
While delayed tape retrieval affects recovery speed, it does not indicate data loss.
Option C (More frequent backups than required):
Frequent backups improve data protection, not cause unacceptable loss.
Option D (Less frequent offsite backups):
While infrequent backups increase risk, they do not directly indicate data loss upon testing.
Backup tapes containing empty spaces indicate potential data loss, making it the most critical disaster recovery risk.
IIA GTAG 16, ISO 27001, and NIST SP 800-34 highlight the need for validated backup integrity.
Final Justification:IIA References:
IIA GTAG 16 – Data Management and IT Auditing
ISO 27001 – Information Security Backup Standards
NIST SP 800-34 – Contingency Planning for IT Systems
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
Verify completeness and accuracy.
Verify existence and accuracy.
Verify completeness and integrity.
Verify existence and completeness.
In the data analytics process, the first step after obtaining data is to ensure its completeness and accuracy. If data is incomplete or inaccurate, the entire analysis process is compromised, leading to unreliable results.
Let’s analyze each option:
Option A: Verify completeness and accuracy.
Correct.
Completeness ensures that all necessary data points are included, preventing missing or incomplete datasets.
Accuracy ensures that data values are correct and free from errors, ensuring reliability for analysis.
IIA Reference: Internal auditors use data validation techniques to confirm completeness and accuracy before analysis. (IIA GTAG: Auditing with Data Analytics)
Option B: Verify existence and accuracy.
Incorrect. While existence is important (ensuring data is valid and not fabricated), completeness is more critical in the initial step to avoid missing data.
Option C: Verify completeness and integrity.
Incorrect. Integrity refers to the reliability and consistency of data across systems, which is a later step after verifying completeness and accuracy.
Option D: Verify existence and completeness.
Incorrect. Existence is less relevant at the initial stage than accuracy, which is crucial for avoiding misinterpretation of results.
Thus, the verified answer is A. Verify completeness and accuracy.
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Cost of sales and net income are understated.
Cost of sales and net income are overstated.
Cost of sales is understated and not income is overstated.
Cost of sales is overstated and net Income is understated.
When inventory is understated (not included in the physical count) at year-end, the financial impact affects both cost of sales (COGS) and net income as follows:
Correct Answer (C - Cost of Sales is Understated and Net Income is Overstated)
The ending inventory is part of the formula used to calculate the cost of goods sold (COGS): COGS=BeginningInventory+Purchases−EndingInventoryCOGS = Beginning Inventory + Purchases - Ending InventoryCOGS=BeginningInventory+Purchases−EndingInventory
If ending inventory is understated, then:
COGS will be understated (because inventory that should have been counted as sold was omitted).
Net income will be overstated because COGS is lower than it should be, making profits appear higher.
This error causes financial misstatements, violating IIA auditing standards for financial accuracy.
Why Other Options Are Incorrect:
Option A (Cost of sales and net income are understated):
Net income would not be understated—it would be overstated because the cost of goods sold is too low.
Option B (Cost of sales and net income are overstated):
COGS would be understated, not overstated. If COGS were overstated, net income would be understated.
Option D (Cost of sales is overstated and net income is understated):
The opposite happens—COGS is understated and net income is overstated.
IIA GTAG 8: Audit of Inventory Management – Covers financial impact of inventory misstatements.
IIA Practice Guide: Auditing Financial Statements – Addresses common inventory errors and financial reporting impacts.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because an understated inventory reduces COGS and inflates net income.
Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?
It calculates the overall value of a project.
It ignores the time value of money.
It calculates the time a project takes to break even.
It begins at time zero for the project.
The discounted payback period (DPP) is a capital budgeting technique that determines how long it takes for a project’s discounted cash flows to recover its initial investment. Unlike the regular payback period, the DPP accounts for the time value of money by discounting future cash flows.
(A) It calculates the overall value of a project.
Incorrect. The discounted payback period only measures how long it takes to recover the initial investment—it does not determine the overall value of a project. Net Present Value (NPV) and Internal Rate of Return (IRR) are used to evaluate a project's overall value.
(B) It ignores the time value of money.
Incorrect. Unlike the regular payback period, the discounted payback period accounts for the time value of money by discounting future cash flows using a required rate of return.
(C) It calculates the time a project takes to break even. ✅
Correct. The discounted payback period determines how long it takes for the present value of cash inflows to recover the initial investment. It helps assess the risk and liquidity of a project.
IIA GTAG "Auditing Capital Budgeting and Investment Decisions" states that discounted payback is useful for assessing the risk of projects by considering cash flow recovery time.
(D) It begins at time zero for the project.
Incorrect. The calculation starts at time zero (when the investment is made), but the method itself focuses on future discounted cash flows to determine the break-even point.
IIA GTAG – "Auditing Capital Budgeting and Investment Decisions"
COSO ERM Framework – Capital Investment Risk Management
GAAP/IFRS – Discounted Cash Flow Methods
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as the discounted payback period measures the time needed to break even after adjusting for the time value of money.
A small software development firm designs and produces custom applications for businesses. The application development team consists of employees from multiple departments who all report to a single project manager. Which of the following organizational structures does this situation represent?
Functional departmentalization.
Product departmentalization
Matrix organization.
Divisional organization
Understanding Organizational Structures:
Organizations structure their workforce based on functions, products, or a combination of both.
A matrix organization combines functional and project-based structures, where employees report to both a functional manager and a project manager.
Why Option C (Matrix Organization) Is Correct?
The software development firm uses employees from multiple departments who report to a single project manager, which is a defining characteristic of a matrix structure.
Employees maintain their departmental roles while contributing to project-based work.
IIA Standard 2110 – Governance supports evaluating flexible organizational structures like matrix organizations to ensure accountability and risk management.
Why Other Options Are Incorrect?
Option A (Functional departmentalization):
In functional structures, employees report to one department head, not a project manager.
Option B (Product departmentalization):
In product-based structures, employees are grouped based on specific product lines, not cross-functional projects.
Option D (Divisional organization):
A divisional structure separates business units based on markets, regions, or customer segments, not cross-functional teams.
A matrix organization allows employees to work across departments under a project manager, making option C the best choice.
IIA Standard 2110 supports assessing governance structures that involve cross-functional teams.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Organizational Structures & Reporting Lines)
COSO ERM – Risk Management in Matrix Organizations
Project Management Institute (PMI) – Matrix Management Best Practices
Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?
Anti-malware software
Authentication
Spyware
Rooting
Authentication is a key security control that prevents unauthorized users from accessing a smart device’s data or applications. It ensures that only authorized individuals can use the device, reducing risks such as data breaches, identity theft, and cyberattacks.
(A) Anti-malware software.
Incorrect. Anti-malware software protects against malicious programs, but it does not control user access to a device.
(B) Authentication. ✅
Correct. Authentication mechanisms (such as passwords, biometrics, PINs, and two-factor authentication) prevent unauthorized access to a device’s data and applications.
IIA GTAG "Managing and Auditing IT Vulnerabilities" highlights authentication as a primary control for protecting smart devices.
(C) Spyware.
Incorrect. Spyware is a security threat, not a preventive control. It is a type of malicious software that steals data from a device.
(D) Rooting.
Incorrect. Rooting (on Android) or jailbreaking (on iOS) refers to modifying a device to remove security restrictions, which increases security risks rather than preventing unauthorized access.
IIA GTAG – "Managing and Auditing IT Vulnerabilities"
IIA Standard 2120 – Risk Management
NIST Cybersecurity Framework – Identity and Access Management
Analysis of Answer Choices:IIA References:Thus, the correct answer is B, as authentication is the most effective security control for preventing unauthorized access to smart devices.
Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?
At the value agreed upon by the partners.
At book value.
At fair value
At the original cost.
Recording Initial Investment in a Partnership:
When forming a partnership, each partner contributes assets, cash, or services to the business.
The initial investment should be recorded at the value agreed upon by the partners, which may differ from fair market value or book value.
This is because partnerships are formed based on mutual agreement, and partners decide how to allocate capital and contributions.
Why Other Options Are Incorrect:
B. At book value:
Book value refers to the value recorded in a partner’s individual financial statements. However, in a new partnership, the previous book value is not relevant.
C. At fair value:
While fair value is commonly used in financial reporting, in partnerships, the agreed-upon value is more relevant as partners may negotiate different terms.
D. At the original cost:
The original cost of assets contributed may not reflect their current market or partnership-agreed value, making it an inappropriate basis for initial recording.
IIA’s Perspective on Financial Recording:
IIA Standard 1220 – Due Professional Care requires auditors to ensure that financial transactions are recorded in accordance with agreed terms.
COSO Internal Control – Integrated Framework supports the principle that partnership agreements should dictate valuation methods.
GAAP & IFRS Accounting Guidelines recognize that partnership accounting is based on agreed-upon contributions rather than standardized valuation methods.
IIA References:
IIA Standard 1220 – Due Professional Care
COSO Internal Control – Integrated Framework
GAAP & IFRS Partnership Accounting Standards
Which of the following is a disadvantage in a centralized organizational structure?
Communication conflicts
Slower decision making.
Loss of economies of scale
Vulnerabilities in sharing knowledge
A centralized organizational structure concentrates decision-making authority at the top levels of management. While this ensures control and consistency, it can lead to slower decision-making due to the need for approvals from higher levels.
Let’s analyze each option:
Option A: Communication conflicts.
Incorrect.
Centralized structures generally have clear lines of authority and communication, reducing conflicts.
Communication conflicts are more common in decentralized structures where multiple decision-makers exist.
Option B: Slower decision making.
Correct.
Since all decisions must pass through top management, it delays responses to market changes and reduces flexibility.
Lower-level employees have less authority to make operational decisions, leading to bottlenecks.
IIA Reference: Internal auditors assess organizational governance, including decision-making efficiency in centralized vs. decentralized structures. (IIA Practice Guide: Organizational Governance)
Option C: Loss of economies of scale.
Incorrect.
Centralization improves economies of scale by standardizing processes and consolidating resources.
Decentralization (not centralization) is more likely to lead to duplication of efforts and a loss of economies of scale.
Option D: Vulnerabilities in sharing knowledge.
Incorrect.
Centralized organizations tend to have structured knowledge-sharing frameworks, such as standardized policies and corporate training programs.
An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?
$0
$4,000
$5,000
$10,000
The carrying amount (inventory value) of defective items is calculated based on the lower of cost or net realizable value (NRV) principle under Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS).
Given data:
Market price (normal selling price): $10 per unit
Production cost: $4 per unit
Defect selling price (NRV): $5 per unit
Total defective units: 10,000
Step 1: Determine the valuation ruleAccording to IAS 2 (Inventories), inventory should be valued at the lower of cost or net realizable value (NRV):
Cost per unit = $4
NRV per unit = $5
Since $4 (cost) < $5 (NRV), the cost per unit ($4) is used for valuation.
Step 2: Calculate total carrying amount
10,000 units×4 (cost per unit)=40,00010,000 \text{ units} \times 4 \text{ (cost per unit)} = 40,00010,000 units×4 (cost per unit)=40,000
However, since the items are defective, their value is determined by NRV ($5 per unit) because they cannot be sold at full market price.
10,000×5=50,00010,000 \times 5 = 50,00010,000×5=50,000
Since inventory should be recorded at the lower of cost or NRV, the inventory value is $5 per unit instead of $4.
10,000×5=5,00010,000 \times 5 = 5,00010,000×5=5,000
Thus, the verified answer is C. $5,000.
Which of the following is classified as a product cost using the variable costing method?
1. Direct labor costs.
2. Insurance on a factory.
3. Manufacturing supplies.
4. Packaging and shipping costa.
1 and 2
1 and 3
2 and 4
3 and 4
Under the variable costing method, product costs include only costs that vary with production, such as direct materials, direct labor, and variable manufacturing overhead.
(1) Direct labor costs. ✅
Correct. Direct labor is a variable cost directly tied to production levels, making it a product cost under variable costing.
(2) Insurance on a factory. ❌
Incorrect. Factory insurance is a fixed manufacturing overhead cost, which is not treated as a product cost under variable costing. It is considered a period cost instead.
(3) Manufacturing supplies. ✅
Correct. Manufacturing supplies (e.g., lubricants, small tools) are variable costs that increase with production, making them product costs under variable costing.
(4) Packaging and shipping costs. ❌
Incorrect. Packaging and shipping are selling & distribution costs, which are classified as period costs, not product costs.
IIA GTAG – "Auditing Cost Accounting Systems"
IIA Standard 2130 – Control Activities (Cost Management)
GAAP and IFRS Guidelines on Variable Costing
Analysis of Answer Choices:IIA References:Thus, the correct answer is B (1 and 3 only) because direct labor and manufacturing supplies are considered product costs under the variable costing method.
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
Export strategy.
Transnational strategy
Multi-domestic strategy
Globalization strategy
A globalization strategy focuses on delivering standardized products and marketing campaigns across multiple international markets with minimal local customization. This approach ensures brand consistency and cost efficiencies while targeting a broad audience.
(A) Export strategy.
Incorrect. An export strategy refers to selling domestic products overseas without significant marketing adaptation. It does not involve a unique advertising campaign tailored for global markets.
(B) Transnational strategy.
Incorrect. A transnational strategy balances global efficiency with local responsiveness, meaning advertising campaigns would be adapted based on regional preferences rather than being uniform across all markets.
(C) Multi-domestic strategy.
Incorrect. A multi-domestic strategy involves customizing products and marketing approaches for each local market. This is the opposite of a standardized advertising campaign.
(D) Globalization strategy. ✅
Correct. A globalization strategy implements a standardized marketing approach to maintain a consistent brand message across all markets while reducing costs.
Example: Companies like Apple, Coca-Cola, and Nike use globalized advertising to promote identical products across different countries.
IIA Standard 2110 – Governance emphasizes the need for alignment between business strategy and risk management, which includes global marketing decisions.
IIA Standard 2110 – Governance
COSO Framework – Strategic Risk Management
IIA GTAG – "Auditing Business Strategy Alignment"
Analysis of Answer Choices:IIA References:Thus, the correct answer is D, as a globalization strategy effectively supports a uniform advertising campaign for identical products across multiple markets.
An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
The auditor is normalizing data in preparation for analyzing it.
The auditor is analyzing the data in preparation for communicating the results,
The auditor is cleaning the data in preparation for determining which processes may be involves .
The auditor is reviewing trio data prior to defining the question
In data analytics, cleaning the data is a crucial step where the auditor eliminates redundancies, corrects inconsistencies, and removes errors to ensure accurate analysis. This step is taken before analyzing the data to identify high-risk areas and relevant processes.
Correct Answer (C - Cleaning the Data in Preparation for Determining Involved Processes)
Data cleaning involves:
Removing duplicate entries to prevent misinterpretation.
Standardizing data formats for consistency.
Handling missing or inaccurate values to ensure reliability.
This step prepares the data for analysis and identification of high-risk processes.
The IIA’s GTAG 16: Data Analysis Technologies emphasizes data cleaning as a critical part of internal audit analytics.
Why Other Options Are Incorrect:
Option A (Normalizing data in preparation for analyzing it):
Normalization refers to structuring data efficiently (e.g., in databases) but does not necessarily involve eliminating redundancies in the way described.
Option B (Analyzing data in preparation for communicating results):
The auditor is still in the data preparation phase, not the analysis or reporting phase.
Option D (Reviewing data prior to defining the question):
The auditor is already working with data. Defining questions typically happens before data collection.
GTAG 16: Data Analysis Technologies – Covers data preparation, cleaning, and analytics in internal auditing.
IIA Practice Guide: Data Analytics in Internal Auditing – Outlines best practices for data validation and cleaning.
Step-by-Step Explanation:IIA References for Validation:Thus, cleaning the data (C) is the correct answer, as it ensures data integrity before identifying relevant processes and risks.
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
Session hijacking.
Jailbreaking
Eavesdropping,
Authentication.
Understanding Copyright Issues and Smart Devices:
Copyright laws protect software, firmware, and intellectual property embedded in smart devices.
Jailbreaking refers to modifying a device’s software to remove manufacturer-imposed restrictions, often to install unauthorized third-party apps.
This violates software licensing agreements and may infringe on copyright protections under laws like the Digital Millennium Copyright Act (DMCA).
Why Option B (Jailbreaking) Is Correct?
Jailbreaking allows users to bypass manufacturer restrictions, potentially leading to unauthorized software distribution and copyright violations.
Manufacturers implement Digital Rights Management (DRM) to protect copyrighted firmware and software, which jailbreaking circumvents.
IIA Standard 2110 – Governance includes evaluating intellectual property risks and compliance in IT audits.
Why Other Options Are Incorrect?
Option A (Session hijacking):
This is a cybersecurity attack where a hacker takes control of a user session. It does not impact copyright laws.
Option C (Eavesdropping):
Eavesdropping refers to unauthorized network surveillance, which is a privacy issue, not a copyright issue.
Option D (Authentication):
Authentication is a security mechanism to verify user identity and has no direct relation to copyright concerns.
Jailbreaking bypasses copyright protections and violates software licensing agreements, making it the best answer.
IIA Standard 2110 emphasizes the importance of IT governance and compliance with intellectual property laws.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Intellectual Property & IT Compliance)
ISO 27001 – IT Security & Digital Rights Protection
Digital Millennium Copyright Act (DMCA) – Copyright Protection for Software
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
Job complicating
Job rotation
Job enrichment
Job enlargement
Understanding Job Enrichment:
Job enrichment is a job design technique that increases motivation by adding meaningful responsibilities, autonomy, and recognition to a job.
It aligns with Herzberg’s Two-Factor Theory, which suggests that responsibility and recognition are key motivators.
How Job Enrichment Increases Employee Motivation:
Increases Autonomy: Employees are given more decision-making power, leading to a stronger sense of ownership.
Provides Recognition: Workers receive direct feedback and acknowledgment for their contributions.
Encourages Skill Development: Employees handle more complex tasks, improving job satisfaction and career growth opportunities.
Why Other Options Are Incorrect:
A. Job complicating – Incorrect, as this is not a recognized job design technique; increasing job difficulty does not improve motivation.
B. Job rotation – Incorrect, as job rotation involves shifting employees between different tasks to reduce monotony, but it does not necessarily increase job responsibility or recognition.
D. Job enlargement – Incorrect, as job enlargement adds more tasks at the same skill level, increasing workload without necessarily improving responsibility or recognition.
IIA’s Perspective on Employee Motivation and Organizational Success:
IIA Standard 2120 – Risk Management states that internal auditors should evaluate employee engagement strategies, including job design techniques.
COSO ERM Framework emphasizes that motivated employees contribute to operational efficiency and organizational success.
IIA References:
IIA Standard 2120 – Risk Management & Employee Motivation
Herzberg’s Two-Factor Theory – Motivation through Responsibility and Recognition
COSO ERM – Employee Engagement and Organizational Performance
Thus, the correct and verified answer is C. Job enrichment.
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
Authorization
Architecture model
Firewall
Virtual private network
Definition of a Firewall:
A firewall is a network security device (hardware or software) that monitors and controls incoming and outgoing network traffic.
It is designed to filter or prevent specific information from moving between internal and external networks, ensuring unauthorized access is blocked.
How a Firewall Works:
It uses rules and policies to determine whether to allow or block traffic.
Firewalls can be configured to prevent malware, hacking attempts, and unauthorized data transfers.
There are different types, including packet-filtering firewalls, stateful inspection firewalls, and next-generation firewalls (NGFWs).
Why Other Options Are Incorrect:
A. Authorization:
Authorization refers to user access control, ensuring users have the correct permissions, but it does not filter network traffic.
B. Architecture model:
An architecture model defines the structure of an IT system but does not actively prevent or filter data movement.
D. Virtual private network (VPN):
A VPN encrypts data and provides secure remote access but does not filter or block data movement between networks.
IIA’s Perspective on IT Security Controls:
IIA Standard 2110 – Governance emphasizes strong cybersecurity controls, including firewalls, to protect sensitive data.
IIA GTAG (Global Technology Audit Guide) on Information Security recommends using firewalls as a primary defense mechanism.
NIST Cybersecurity Framework and ISO 27001 Security Standards identify firewalls as critical tools for network security and data protection.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – Information Security Risks
NIST Cybersecurity Framework
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software
Updating operating software in a haphazard manner,
Applying a weak password for access to a mobile device.
JoIIbreaking a locked smart device
Understanding BYOD Risks and Legal Implications
Bring-your-own-device (BYOD) policies allow employees to use personal devices for work, but they introduce compliance risks.
Jailbreaking is the process of bypassing manufacturer-imposed security restrictions on a device (e.g., iPhones or Android devices).
This significantly increases the risk of privacy law violations, copyright infringements, and security breaches.
Why Option D is Correct?
Jailbreaking allows users to:
Install unauthorized software, which may violate software licensing agreements and copyright laws.
Remove security restrictions, increasing exposure to data breaches, malware, and non-compliance with privacy regulations (e.g., GDPR, HIPAA, or CCPA).
Bypass digital rights management (DRM), leading to potential copyright infringement issues.
IIA Standard 2110 – Governance mandates that internal auditors evaluate IT risks, including legal compliance related to mobile device usage.
ISO 27001 – Information Security Management also highlights the risks of unapproved software on enterprise devices.
Why Other Options Are Incorrect?
Option A (Not installing anti-malware software):
While a security risk, this primarily exposes devices to cyber threats rather than directly causing regulatory infringements.
Option B (Updating operating software in a haphazard manner):
Irregular updates pose security risks, but they do not directly violate copyright or privacy laws.
Option C (Applying a weak password):
Weak passwords increase security risks, but they do not inherently cause regulatory infringements like jailbreaking does.
Jailbreaking increases risks of copyright infringement (through unauthorized apps) and privacy violations (by removing security controls).
IIA Standard 2110 and ISO 27001 emphasize legal and regulatory compliance in IT security audits.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT & Legal Compliance Risks)
ISO 27001 – Information Security Compliance
GDPR, HIPAA, and CCPA – Privacy Law Considerations for BYOD
An organization uses the management-by-objectives method whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
It is particularly helpful to management when the organization is facing rapid change.
It is a more successful approach when adopted by mechanistic organizations.
It is mere successful when goal setting is performed not only by management, but by all team members, including lower-level staff.
It is particularly successful in environments that are prone to having poor employer-employee relations.
Understanding Management by Objectives (MBO):
MBO is a performance management approach where employees set clear, measurable goals aligned with organizational objectives.
Success depends on employee participation in goal-setting to increase motivation, commitment, and performance.
Why MBO Works Best with Employee Involvement:
Engagement and Accountability: Employees are more motivated and accountable when they help define their goals.
Alignment with Organizational Strategy: Ensures that goals at all levels support the company’s broader objectives.
Improved Communication: Encourages collaboration between management and employees, leading to better alignment of expectations.
Why Other Options Are Incorrect:
A. It is particularly helpful to management when the organization is facing rapid change:
MBO is not well-suited for rapidly changing environments, as predefined goals may become irrelevant quickly.
B. It is more successful when adopted by mechanistic organizations:
Mechanistic organizations (rigid structures, strict hierarchies) often struggle with MBO because it requires flexibility and employee participation.
D. It is particularly successful in environments that are prone to having poor employer-employee relations:
While MBO can improve communication, it is not a solution for poor employer-employee relations, as trust and collaboration are essential for its success.
IIA’s Perspective on Performance Management and Organizational Success:
IIA Standard 2120 – Risk Management emphasizes the need for effective goal-setting and employee involvement in performance assessment.
Balanced Scorecard Framework supports MBO principles by aligning employee performance with strategic objectives.
COSO ERM Framework highlights the importance of employee engagement in goal-setting to enhance decision-making and risk management.
IIA References:
IIA Standard 2120 – Risk Management & Employee Performance Assessment
COSO ERM – Performance & Risk Alignment
Balanced Scorecard Approach – Employee Participation in Goal Setting
Thus, the correct and verified answer is C. It is more successful when goal setting is performed not only by management, but by all team members, including lower-level staff.
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.
Ensure that relevant access to key applications is strictly controlled through an approval and review process.
Institute detection and authentication controls for all devices used for network connectivity and data storage.
Use management software scan and then prompt parch reminders when devices connect to the network
Understanding BYOD Risks:
A Bring-Your-Own-Device (BYOD) policy allows employees to use personal devices (e.g., laptops, smartphones, tablets) for work.
This increases security risks such as unauthorized access, malware infections, data leakage, and non-compliance with IT security policies.
Why Option C (Detection and Authentication Controls) Is Correct?
Detection and authentication controls ensure that:
Only authorized devices can connect to the organization's network.
User authentication mechanisms (such as multi-factor authentication) verify identities before granting access.
Devices with security vulnerabilities are flagged and restricted.
This aligns with IIA Standard 2110 – Governance, which emphasizes IT security controls for risk mitigation.
ISO 27001 and NIST Cybersecurity Framework also recommend device authentication and monitoring for secure network access.
Why Other Options Are Incorrect?
Option A (Limit personal use of employee devices):
Limiting personal use does not fully address network security risks; malware can still infect devices.
Option B (Control access through approvals and reviews):
While access control is important, it does not mitigate the broader risks of compromised devices connecting to the network.
Option D (Software scans and patch reminders):
Patching is important, but it does not prevent unauthorized access or ensure authentication for devices.
Implementing device detection and authentication controls is the most effective way to mitigate security risks in a BYOD environment.
IIA Standard 2110 and ISO 27001 emphasize strong network security measures.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT Risk Management & BYOD Security)
ISO 27001 – Information Security Management
NIST Cybersecurity Framework – Access Control & Authentication
Which of the following should be included in a data privacy poky?
1. Stipulations for deleting certain data after a specified period of time.
2. Guidance on acceptable methods for collecting personal data.
3. A requirement to retain personal data indefinitely to ensure a complete audit trail,
4. A description of what constitutes appropriate use of personal data.
1 and 2 only
2 and 3 only
1, 2 and 4 only
2, 3, and 4 only
A data privacy policy outlines how an organization collects, stores, processes, and protects personal data. It should comply with global data protection regulations such as GDPR, CCPA, and IIA guidelines on data security.
(1) Stipulations for deleting certain data after a specified period of time. ✅
Correct. Many data protection laws (e.g., GDPR Article 5) require organizations to delete personal data after a defined retention period to reduce data breach risks.
(2) Guidance on acceptable methods for collecting personal data. ✅
Correct. A privacy policy must define legal and ethical ways to collect personal data (e.g., user consent, lawful processing).
(3) A requirement to retain personal data indefinitely to ensure a complete audit trail. ❌
Incorrect. Retaining personal data indefinitely violates most data privacy regulations (e.g., GDPR Right to Be Forgotten). Data must be stored only for as long as necessary.
(4) A description of what constitutes appropriate use of personal data. ✅
Correct. A privacy policy should clearly define how collected data can and cannot be used to prevent misuse and ensure compliance.
IIA GTAG – "Auditing Privacy Risks"
IIA Standard 2110 – Governance (Data Protection & Privacy)
GDPR (General Data Protection Regulation) – Articles 5 & 17 (Data Retention & Deletion)
Analysis of Answer Choices:IIA References:Thus, the correct answer is C (1, 2, and 4 only) because data should not be retained indefinitely, and the policy must include data collection, retention, and appropriate usage guidelines.
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization's critical data
A physical control is a security measure designed to protect assets, facilities, and personnel from physical threats such as fire, theft, or unauthorized access. Fire detection and suppression equipment (e.g., fire alarms, sprinklers, extinguishers) directly protects physical assets, making it a clear example of a physical control.
(A) Providing fire detection and suppression equipment. ✅
Correct. This is a direct physical security control that helps mitigate fire risks by detecting and suppressing fires.
IIA GTAG "Physical Security and IT Asset Protection" identifies fire detection as an essential physical security measure.
(B) Establishing a physical security policy and promoting it throughout the organization. ❌
Incorrect. A policy is an administrative control, not a physical control. While important, it does not provide direct physical protection.
(C) Performing business continuity and disaster recovery planning. ❌
Incorrect. This is a procedural control, not a physical one. Planning for disasters does not physically secure assets but instead prepares an organization for recovery.
(D) Keeping an offsite backup of the organization's critical data. ❌
Incorrect. This is an IT security control, ensuring data availability rather than physically protecting assets.
IIA GTAG – "Physical Security and IT Asset Protection"
IIA Standard 2110 – Governance (Risk Management Controls)
COBIT Framework – Physical and Environmental Security Controls
Analysis of Answer Choices:IIA References:Thus, the correct answer is A, as fire detection and suppression equipment provides direct physical protection against fire-related risks.
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters.
Orders, commands, and advice are sent to the subsidiaries from headquarters.
Poop o of local nationality are developed for the best positions within their own country.
There is a significant amount of collaboration between headquarters and subs diaries.
An ethnocentric attitude in global business means that the parent company (headquarters) makes all key decisions and expects its foreign subsidiaries to follow directives without much autonomy. This approach often results in centralized control, standardized policies, and minimal local input.
(A) Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters.
Incorrect. In an ethnocentric organization, standards and controls are determined by headquarters, not by local subsidiaries.
IIA Standard 2120 – Risk Management emphasizes that corporate governance should ensure consistent policies across all locations, which aligns with ethnocentric approaches.
(B) Orders, commands, and advice are sent to the subsidiaries from headquarters. ✅
Correct. In ethnocentric organizations, decision-making authority is centralized at headquarters, and subsidiaries are expected to follow orders and policies without deviation.
IIA GTAG "Auditing Global Operations" discusses risks related to centralized control structures, where headquarters enforces policies globally.
(C) People of local nationality are developed for the best positions within their own country.
Incorrect. This describes a polycentric approach, where local talent is developed for leadership roles. Ethnocentric organizations prefer to assign expatriates from headquarters to key positions in subsidiaries.
(D) There is a significant amount of collaboration between headquarters and subsidiaries.
Incorrect. Collaboration is more common in geocentric or regiocentric models, where decision-making is shared. Ethnocentric organizations have limited collaboration, as headquarters dictates policies.
IIA GTAG – "Auditing Global Operations"
IIA Standard 2120 – Risk Management
COSO Framework – Internal Control and Corporate Governance
Analysis of Answer Choices:IIA References:Thus, the correct answer is B, as ethnocentric organizations enforce top-down control, sending orders, commands, and advice to subsidiaries.
According to IIA guidance, which of the following links computers and enables them to -communicate with each other?
Application program code
Database system
Operating system
Networks
Understanding Computer Communication Systems:
Computers communicate with each other using network infrastructure, which allows data transfer, resource sharing, and remote access.
A network connects multiple devices, enabling them to exchange information, access shared resources, and collaborate efficiently.
Why Option D (Networks) Is Correct?
A computer network consists of hardware (routers, switches, and cables) and software (protocols like TCP/IP) that facilitate communication.
Networks can be local (LAN), wide-area (WAN), or cloud-based, providing the backbone for IT operations.
IIA GTAG 11 – Developing the IT Audit Plan emphasizes auditing network security and communication controls.
Why Other Options Are Incorrect?
Option A (Application program code):
Application programs allow users to perform specific tasks but do not link computers for communication.
Option B (Database system):
A database stores and retrieves data, but it does not enable direct communication between computers.
Option C (Operating system):
The operating system manages a single computer’s resources but does not connect multiple computers.
Networks are responsible for linking computers and enabling communication, making option D the correct choice.
IIA GTAG 11 highlights the importance of network infrastructure in IT auditing.
Final Justification:IIA References:
IIA GTAG 11 – Developing the IT Audit Plan
ISO 27001 – IT Network Security Management
NIST SP 800-53 – Network Security Controls
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations.
Drafting a strong contract that requires regular vendor control reports end a right-to-audit clause.
Applying administrative privileges to ensure right to access controls are appropriate.
Creating a standing cyber-security committee to identify and manage risks related to data security
When an organization outsources network and data management to a third party, the first step in risk management is to ensure that the contractual agreement includes strong governance provisions, including:
Regular vendor control reports to monitor security and performance.
A right-to-audit clause, allowing the organization to periodically assess compliance and security controls.
Correct Answer (B - Drafting a Strong Contract with Vendor Control Reports & Right-to-Audit Clause)
IIA Practice Guide: Auditing Third-Party Risk Management recommends that contracts with vendors include clear security expectations, reporting requirements, and audit rights.
A right-to-audit clause allows internal auditors to verify compliance with security policies.
Vendor control reports (e.g., SOC 2 reports) provide assurance that the vendor meets security and compliance standards.
Why Other Options Are Incorrect:
Option A (Creating a comprehensive reporting system for vendors):
While useful, a reporting system alone is not the first step—it should be included after contractual protections are in place.
Option C (Applying administrative privileges to ensure appropriate access controls):
This applies to internal access management but does not address third-party risk management.
Option D (Creating a cybersecurity committee):
A cybersecurity committee helps manage ongoing risks, but contractual controls are the first step in managing third-party risk.
IIA Practice Guide: Auditing Third-Party Risk Management – Recommends strong contracts with right-to-audit clauses.
GTAG 7: Information Technology Outsourcing – Discusses vendor risk management and contractual safeguards.
Step-by-Step Explanation:IIA References for Validation:Thus, the best first step is drafting a strong contract with vendor control reports and a right-to-audit clause (B).
The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
1. Favorable labor efficiency variance.
2. Adverse labor rate variance.
3. Adverse labor efficiency variance.
4. Favorable labor rate variance.
1 and 2
1 and 4
3 and A
2 and 3
Understanding Labor Variances in Cost Accounting:
Labor efficiency variance measures the difference between the actual hours worked and the standard hours allowed for actual production.
Labor rate variance measures the difference between the actual labor cost per hour and the standard rate set for labor.
Why Options 1 (Favorable Labor Efficiency Variance) and 2 (Adverse Labor Rate Variance) Are Correct?
Favorable Labor Efficiency Variance (1):
Hiring more experienced researchers should lead to higher productivity, meaning that the team completes tasks faster, reducing the total labor hours required.
This results in a favorable labor efficiency variance because less time is spent on the project than initially expected.
Adverse Labor Rate Variance (2):
More experienced employees command higher salaries, leading to an increase in labor costs per hour compared to the budgeted rate.
This results in an adverse labor rate variance because the actual wage rate exceeds the standard rate.
Why Other Options Are Incorrect?
Option 3 (Adverse Labor Efficiency Variance):
This would occur if the new hires were less productive, which contradicts the scenario.
Option 4 (Favorable Labor Rate Variance):
A favorable variance in labor rate occurs when labor costs are lower than expected, which is unlikely when hiring more experienced (higher-paid) employees.
Hiring more experienced employees improves efficiency (favorable efficiency variance) but increases wages (adverse rate variance).
IIA Standard 1220 – Due Professional Care requires auditors to consider operational efficiency in decision-making evaluations.
Final Justification:IIA References:
IPPF Standard 1220 – Due Professional Care
IIA Practice Guide – Assessing Business Performance Metrics
Which of the following statements is true regarding cost-volume-profit analysis?
Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.
Breakeven point is the amount of units sold to cover variable costs.
Breakeven occurs when the contribution margin covers fixed costs.
Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.
Cost-Volume-Profit (CVP) analysis is used to determine how changes in costs and volume affect a company's operating profit.
Correct Answer (C - Breakeven Occurs When the Contribution Margin Covers Fixed Costs)
Contribution Margin (CM) = Sales Revenue – Variable Costs.
The breakeven point is where total contribution margin equals total fixed costs, meaning the company has no profit or loss.
The IIA’s Practice Guide: Auditing Financial Performance supports this as the key breakeven definition.
Why Other Options Are Incorrect:
Option A (Contribution margin is the amount remaining after fixed expenses are deducted):
Incorrect because CM is calculated before fixed expenses are subtracted.
Option B (Breakeven point is the amount of units sold to cover variable costs):
Incorrect because breakeven covers fixed costs as well, not just variable costs.
Option D (Following breakeven, operating income increases by the excess of fixed costs less variable costs per unit sold):
Incorrect because operating income increases by the contribution margin per unit, not by the difference between fixed and variable costs.
IIA Practice Guide: Auditing Financial Performance – Defines breakeven analysis as when contribution margin covers fixed costs.
IIA GTAG 13: Business Performance – Discusses cost-volume-profit analysis for financial decision-making.
IIA References for Validation:Thus, C is the correct answer because breakeven occurs when the contribution margin equals fixed costs.
Which of the following statements is true regarding data backup?
System backups should always be performed real time.
Backups should be stored in a secured location onsite for easy access.
The tape rotation schedule affects how long data is retained
Backup media should be restored only m case of a hardware or software failure
A tape rotation schedule defines how often backup tapes are overwritten or archived, directly impacting data retention periods. This is essential for compliance, disaster recovery, and internal controls over data storage.
Correct Answer (C - The Tape Rotation Schedule Affects How Long Data is Retained)
Organizations use backup rotation schemes such as Grandfather-Father-Son (GFS), Tower of Hanoi, or FIFO (First-In-First-Out) to determine how long backups are kept before being overwritten.
This impacts data retention policies, regulatory compliance, and recovery capabilities.
The IIA’s GTAG 10: Business Continuity Management discusses backup strategies and retention management.
Why Other Options Are Incorrect:
Option A (System backups should always be performed real-time):
Real-time backups (continuous data protection) are useful but not always required. Many businesses use scheduled backups instead.
Option B (Backups should be stored in a secured location onsite for easy access):
Best practice recommends offsite or cloud storage to protect against disasters like fire or cyberattacks.
Option D (Backup media should be restored only in case of hardware or software failure):
Backups may also be restored for audit purposes, compliance checks, or business continuity testing.
GTAG 10: Business Continuity Management – Covers backup strategies, data retention, and disaster recovery.
IIA Practice Guide: IT Controls – Discusses backup policies and risks in data management.
Step-by-Step Explanation:IIA References for Validation:Thus, the tape rotation schedule (C) is correct because it determines how long data is retained.
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
Theory of constraints.
Just-in-time method.
Activity-based costing.
Break-even analysis
The Just-in-Time (JIT) method is a managerial accounting and inventory management strategy that focuses on reducing or eliminating excess inventory by receiving goods only as needed.
(A) Theory of constraints.
Incorrect: The theory of constraints focuses on identifying and managing bottlenecks in production, not reducing inventory levels.
(B) Just-in-time method. (Correct Answer)
JIT aims to reduce waste, lower storage costs, and improve efficiency by ensuring that materials and products arrive only when needed.
IIA GTAG 3 – Continuous Auditing suggests monitoring inventory controls to align with JIT principles.
(C) Activity-based costing.
Incorrect: Activity-based costing allocates costs to activities based on usage, not inventory reduction.
(D) Break-even analysis.
Incorrect: Break-even analysis calculates the level of sales needed to cover costs but does not focus on inventory management.
IIA Standard 2120 – Risk Management: Encourages auditors to assess cost-management strategies like JIT.
IIA GTAG 3 – Continuous Auditing: Supports real-time monitoring of inventory to minimize excess stock.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) Just-in-Time (JIT) method, as it focuses on achieving low or no inventory to optimize efficiency and reduce costs.
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
Draft separate audit reports for business and IT management.
Conned IT audit findings to business issues.
Include technical details to support IT issues.
Include an opinion on financial reporting accuracy and completeness.
When reporting internal audit findings related to Enterprise Resource Planning (ERP) systems, IT audit findings must be relevant to business objectives. Business leaders may not fully understand technical IT risks, so reports should translate IT risks into business impacts to ensure actionable decision-making.
(A) Draft separate audit reports for business and IT management.
Incorrect: Fragmenting reports could create misalignment, reducing the effectiveness of integrated risk management.
(B) Connect IT audit findings to business issues. (Correct Answer)
IT auditors should explain how IT risks impact operations, financial reporting, and strategic goals.
IIA Standard 2410 – Criteria for Communicating requires audit findings to be clear, relevant, and actionable for all stakeholders.
IIA GTAG 8 – Auditing Application Controls emphasizes aligning IT controls with business risks.
(C) Include technical details to support IT issues.
Incorrect: While technical details help IT teams, business executives need risk-based insights, not just technical specifics.
(D) Include an opinion on financial reporting accuracy and completeness.
Incorrect: While ERP systems impact financial data, IT auditors should focus on system risks, not directly on financial reporting opinions (which is the role of financial auditors).
IIA Standard 2410 – Criteria for Communicating: Requires clear and business-relevant communication of audit findings.
IIA GTAG 8 – Auditing Application Controls: Advises IT auditors to relate technical risks to business objectives.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because IT audit findings should be framed in a way that connects technical risks to business implications, making them more relevant to management.
During her annual performance review, a sales manager admits that she experiences significant stress due to her job but stays with the organization because of the high bonuses she earns. Which of the following best describes her primary motivation to remain in the job?
Intrinsic reward.
Job enrichment
Extrinsic reward.
The hierarchy of needs.
Extrinsic rewards are external incentives that motivate an employee to perform a task or stay in a job. These rewards include salary, bonuses, benefits, promotions, and other tangible incentives. In this case, the sales manager explicitly states that she remains in the organization because of the high bonuses, making this an example of extrinsic motivation.
(A) Incorrect – Intrinsic reward.
Intrinsic rewards are derived from internal satisfaction, such as personal growth, job fulfillment, or passion for work.
Since the manager stays primarily for monetary bonuses rather than job satisfaction, this is not intrinsic motivation.
(B) Incorrect – Job enrichment.
Job enrichment involves enhancing job roles by adding responsibilities, autonomy, or variety to improve motivation.
The scenario does not mention job enhancement as a reason for staying.
(C) Correct – Extrinsic reward.
High bonuses are a classic example of extrinsic motivation.
The manager is staying for financial incentives rather than job satisfaction.
(D) Incorrect – The hierarchy of needs.
Maslow’s Hierarchy of Needs explains different levels of human motivation, but the question asks for a specific type of motivation rather than a broad theoretical framework.
IIA’s Guide on Human Resources Risk Management
Highlights the impact of extrinsic vs. intrinsic motivation on employee retention.
COSO’s ERM Framework – Employee Retention and Performance Management
Discusses the role of financial incentives in retaining employees.
IIA’s Global Internal Audit Standards – Organizational Behavior and Employee Motivation
Explains intrinsic vs. extrinsic rewards in workforce management.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Lawfulness.
Consideration.
Agreement.
Discharge
Consideration is a fundamental element of a legally binding contract, referring to something of value exchanged between parties. It ensures that each party receives a benefit or suffers a legal detriment in return for the promise made.
Essential for Contract Enforceability – A contract must involve an exchange of value (e.g., money, services, goods, or a promise to act or refrain from acting).
Legal Reciprocity – Both parties must give and receive something of value to make the contract valid.
Distinguishes Contracts from Gifts – A gift is voluntary and does not require consideration, whereas a contract does.
A. Lawfulness – A contract must be lawful, but lawfulness is a requirement, not something exchanged.
C. Agreement – An agreement is part of a contract, but without consideration, an agreement is not legally binding.
D. Discharge – Discharge refers to ending a contract, not forming one.
IIA’s GTAG on Contract Management Risks – Highlights consideration as a key contract principle.
COSO’s Internal Control Framework – Covers contract law fundamentals in risk management.
Common Law and Uniform Commercial Code (UCC) – Define consideration as an essential element of a contract.
Why Consideration is the Correct Answer?Why Not the Other Options?IIA References:
Which of the following best describes depreciation?
It is a process of allocating cost of assets between periods.
It is a process of assets valuation.
It is a process of accumulating adequate funds to replace assets.
It is a process of measuring decline in the value of assets because of obsolescence
Depreciation is the systematic allocation of an asset’s cost over its useful life. It reflects how much of the asset’s value is used up in each accounting period.
Spreads Cost Over Time – Instead of expensing the total cost immediately, depreciation distributes it across multiple periods.
Matches Expenses with Revenue – Ensures that the cost of long-term assets is allocated in the periods they generate revenue.
Required for Financial Reporting – Compliance with GAAP and IFRS requires proper allocation of asset costs.
B. It is a process of asset valuation – Incorrect because depreciation does not determine market value; it only spreads cost over time.
C. It is a process of accumulating adequate funds to replace assets – Incorrect because depreciation is an accounting concept, not a savings mechanism.
D. It is a process of measuring decline in the value of assets because of obsolescence – Incorrect because depreciation allocates cost, not necessarily measuring value decline (which is impairment).
IIA’s GTAG on Financial Controls and Reporting – Defines depreciation as a cost allocation method.
International Financial Reporting Standards (IFRS 16) & US GAAP (ASC 360) – State that depreciation is used to allocate asset costs over time.
COSO’s Internal Control Framework – Covers accounting treatments for fixed assets.
Why Depreciation is an Allocation Process?Why Not the Other Options?IIA References:✅ Final Answer: A. It is a process of allocating cost of assets between periods.
When would a contract be dosed out?
When there's a dispute between the contracting parties
When ail contractual obligations have been discharged.
When there is a force majenre.
When the termination clause is enacted.
A contract is closed out when all the contractual terms have been fully satisfied, including the completion of deliverables, final payments, and any post-contract evaluations or obligations.
Correct Answer (B - When all contractual obligations have been discharged)
According to contract management principles and IIA standards, a contract is officially closed out once:
All agreed-upon deliverables have been completed.
All payments and financial obligations are settled.
Final performance evaluations or audits are completed.
The contract is formally reviewed and documented for closure.
The IIA’s GTAG 3: Contract Management Framework supports that contract closure occurs after full performance and obligations are met.
Why Other Options Are Incorrect:
Option A (When there's a dispute between contracting parties):
Disputes do not necessarily close out a contract; instead, they may lead to mediation, renegotiation, or legal action. The contract remains active until resolved.
The IIA’s Practice Guide: Auditing Contracts recommends dispute resolution mechanisms but does not define them as a reason for contract closure.
Option C (When there is a force majeure event):
A force majeure (unforeseen event like natural disasters or war) may suspend or modify contractual obligations but does not always lead to closure.
The contract may be renegotiated or resumed once conditions allow.
Option D (When the termination clause is enacted):
Termination and closure are not the same. Termination means ending the contract before full obligations are met, whereas closure means fulfilling all obligations.
IIA GTAG 3: Contract Management Framework explains that contract termination can occur under specific clauses, but closure happens only after all duties are fulfilled.
IIA GTAG 3: Contract Management Framework – Covers contract lifecycle, including closeout procedures.
IIA Practice Guide: Auditing Contracts – Details contract auditing, dispute resolution, and obligations fulfillment.
Step-by-Step Explanation:IIA References for Validation:
An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?
he organization's operating expenses are increasing.
The organization has adopted just-in-time inventory.
The organization is experiencing inventory theft.
The organization's inventory is overstated.
A declining inventory turnover combined with an increasing gross margin rate suggests that the organization is not selling inventory as quickly as before, but still reporting higher profitability. This can indicate overstated inventory values, meaning that financial statements show higher inventory balances than what actually exists.
(A) Incorrect – The organization’s operating expenses are increasing.
Operating expenses do not directly affect inventory turnover, which measures how quickly inventory is sold.
Higher expenses could reduce net profit, but they would not explain a higher gross margin.
(B) Incorrect – The organization has adopted just-in-time (JIT) inventory.
JIT inventory systems increase inventory turnover by reducing excess stock.
Since turnover is declining, this suggests the opposite of JIT.
(C) Incorrect – The organization is experiencing inventory theft.
Inventory theft usually reduces inventory levels, potentially increasing inventory turnover due to lower stock.
Theft could lower gross margins if significant losses occur.
(D) Correct – The organization’s inventory is overstated.
Overstated inventory leads to lower COGS, artificially inflating gross margin.
If inventory levels are inflated, turnover appears lower because reported inventory is higher than actual sales justify.
IIA’s Global Internal Audit Standards – Financial Statement Audits and Fraud Risk
Covers risks related to inventory misstatements and financial fraud.
IFRS & GAAP Accounting Standards – Inventory Valuation
Defines how inventory overstatement impacts financial ratios.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following accounting methods is an investor organization likely to use when buying 40 percent of the stock of another organization?
Cost method.
Equity method .
Consolidation method.
Fair value method.
The equity method is used when an investor owns between 20% and 50% of another company’s stock, indicating significant influence over the investee. Since the investor organization is purchasing 40% of the stock, it qualifies for this method.
(A) Cost method.
Incorrect: The cost method is used when the investor has less than 20% ownership and no significant influence.
(B) Equity method. (Correct Answer)
The equity method is required when the investor has significant influence over the investee (typically between 20% and 50% ownership).
Under this method, the investor records a proportional share of the investee’s profits and losses in its financial statements.
IIA Standard 2330 – Documenting Information recommends accurate financial reporting and appropriate accounting method selection.
(C) Consolidation method.
Incorrect: The consolidation method is used when the investor owns more than 50% of the stock, granting control over the investee.
(D) Fair value method.
Incorrect: The fair value method applies when investments are traded in active markets and do not grant significant influence.
IIA Standard 2330 – Documenting Information: Requires appropriate classification of financial investments.
GAAP & IFRS Accounting Standards: Mandate the equity method for ownership between 20% and 50% with significant influence.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) Equity method, as 40% ownership implies significant influence, requiring the use of this method.
Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?
First-in. first-out method (FIFO).
Last-in, first-out method (LIFO).
Specific identification method.
Average-cost method
The FIFO (First-In, First-Out) method values inventory based on the assumption that older, lower-cost inventory is sold first, leaving newer, higher-cost inventory in stock. During periods of rising prices, FIFO results in lower cost of goods sold (COGS) and higher net income, making it susceptible to manipulation by management.
(A) Correct – First-in, first-out method (FIFO).
FIFO lowers COGS when older, cheaper inventory is sold first, inflating net income.
Management can manipulate earnings by selectively selling older, lower-cost inventory.
(B) Incorrect – Last-in, first-out method (LIFO).
LIFO assumes newer, higher-cost inventory is sold first, resulting in higher COGS and lower net income.
LIFO is typically used to reduce taxable income, not to inflate net income.
(C) Incorrect – Specific identification method.
This method tracks the exact cost of each unit, eliminating the ability to manipulate costs easily.
(D) Incorrect – Average-cost method.
The average-cost method smooths out fluctuations in inventory costs, preventing significant income manipulation.
IIA’s Global Internal Audit Standards – Financial Reporting and Inventory Valuation Risks
Discusses inventory accounting methods and their impact on financial statements.
IFRS and GAAP Accounting Standards – Inventory Valuation
Defines how FIFO can be used to influence financial performance.
COSO’s ERM Framework – Financial Manipulation Risks
Identifies inventory valuation as an area where earnings management can occur.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Lower costs.
Slower decision making at the senior executive level.
Limited creative freedom in lower-level managers.
Senior-level executives more focused on short-term, routine decision making
A flatter organizational structure reduces hierarchical levels and promotes greater autonomy for employees. The primary benefit is cost reduction due to fewer management layers and streamlined decision-making.
Fewer Management Layers – Reduces the number of mid-level managers, decreasing salary expenses.
Increased Operational Efficiency – Less bureaucracy leads to faster decision-making, lowering administrative costs.
Encourages Employee Autonomy – Reduces dependence on supervision, improving productivity.
B. Slower decision-making at the senior executive level – Incorrect because flatter structures lead to faster decision-making due to fewer approval levels.
C. Limited creative freedom in lower-level managers – Incorrect because flatter structures provide more autonomy and innovation opportunities.
D. Senior-level executives more focused on short-term, routine decision-making – Incorrect because executives in a flatter structure focus on strategic, high-level decisions, delegating routine tasks.
IIA’s GTAG on Governance and Risk Management – Discusses the financial and operational impacts of different organizational structures.
COSO’s Enterprise Risk Management (ERM) Framework – Emphasizes how flatter structures reduce operational inefficiencies and costs.
COBIT 2019 (Governance Framework) – Highlights the impact of organizational structure on financial performance.
Why Lower Costs is the Correct Answer?Why Not the Other Options?IIA References:
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Veracity, velocity, and variety.
Integrity, availability, and confidentiality.
Accessibility, accuracy, and effectiveness.
Authorization, logical access, and physical access.
Cybersecurity controls are primarily designed to protect the Confidentiality, Integrity, and Availability (CIA) of data. These are the three fundamental principles of cybersecurity and are essential for protecting organizational information assets. Let’s analyze each option:
Option A: Veracity, velocity, and variety.
Incorrect. These attributes are commonly associated with big data and data analytics rather than cybersecurity. Cybersecurity controls focus on ensuring that data is secure, rather than on its volume, speed, or diversity.
IIA Reference: Cybersecurity risk management frameworks emphasize the CIA triad over big data attributes. (IIA GTAG: Auditing Cybersecurity Risk)
Option B: Integrity, availability, and confidentiality.
Correct. These three principles are at the core of cybersecurity:
Confidentiality: Ensures that sensitive information is only accessible to authorized individuals.
Integrity: Protects data from unauthorized modifications or corruption.
Availability: Ensures that data and systems are accessible when needed.
IIA Reference: The IIA’s guidance on IT governance highlights the CIA triad as the foundation of cybersecurity. (IIA GTAG: Information Security Governance)
Option C: Accessibility, accuracy, and effectiveness.
Incorrect. While these attributes are important in data management and usability, they do not directly define cybersecurity controls.
Option D: Authorization, logical access, and physical access.
Incorrect. While these are essential security components, they fall under broader IT security measures rather than forming the fundamental principles of cybersecurity.
Management has decided to change the organizational structure from one that was previously decentralized to one that is now highly centralized. As such: which of the
following would be a characteristic of the now highly centralized organization?
Top management does little monitoring of the decisions made at lower levels.
The decisions made at the lower levels of management are considered very important.
Decisions made at lower levels in the organizational structure are few.
Reliance is placed on top management decision making by few of the organization's departments.
A highly centralized organization is one where decision-making authority is concentrated at the top management level, with lower levels having minimal autonomy. This change means that most critical decisions are made at the corporate level, and lower-level managers have limited decision-making power.
(A) Incorrect – Top management does little monitoring of the decisions made at lower levels.
In a centralized organization, top management monitors and controls most decisions.
This statement applies more to decentralized structures where decision-making is distributed.
(B) Incorrect – The decisions made at the lower levels of management are considered very important.
In a centralized structure, decisions made at lower levels hold less significance since authority is concentrated at the top.
(C) Correct – Decisions made at lower levels in the organizational structure are few.
Centralized structures limit decision-making power at lower levels, keeping control with top executives.
Lower-level managers mostly follow directives from upper management rather than making independent decisions.
(D) Incorrect – Reliance is placed on top management decision-making by few of the organization’s departments.
In a centralized system, most (not just a few) departments rely on top management for decision-making.
IIA’s Global Internal Audit Standards – Organizational Governance and Decision-Making
Explains centralized vs. decentralized structures and their impact on risk management.
COSO’s ERM Framework – Governance and Decision Authority
Discusses the implications of centralization on strategic decision-making.
IIA’s Guide on Corporate Governance and Internal Control Frameworks
Highlights the effect of centralization on accountability, oversight, and risk management.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?
Incremental processing costs, incremental revenue, and variable manufacturing expenses.
Joint costs, incremental processing costs, and variable manufacturing expenses.
Incremental revenue, joint costs, and incremental processing costs.
Variable manufacturing expenses, incremental revenue, and joint costs
When deciding whether to sell a product as-is or process it further, a manufacturer should consider only relevant costs—those that will change based on the decision.
Why Option A (Incremental processing costs, incremental revenue, and variable manufacturing expenses) is Correct:
Incremental processing costs: These are additional costs required to process the material further, making them directly relevant.
Incremental revenue: The additional revenue that would be generated if the product is processed further is a key factor in decision-making.
Variable manufacturing expenses: These costs change with production levels, making them important in the decision-making process.
Why Other Options Are Incorrect:
Option B (Joint costs, incremental processing costs, and variable manufacturing expenses):
Incorrect because joint costs (costs incurred before the split-off point) are sunk costs and are not relevant in the decision.
Option C (Incremental revenue, joint costs, and incremental processing costs):
Incorrect because, again, joint costs are not relevant to the decision.
Option D (Variable manufacturing expenses, incremental revenue, and joint costs):
Incorrect because joint costs should be ignored in a sell-or-process-further decision.
IIA GTAG – "Auditing Cost Accounting Decisions": Discusses relevant costs in decision-making.
IFRS & GAAP Cost Accounting Standards: Explain cost classification and decision-making.
COSO Internal Control – Integrated Framework: Recommends proper cost allocation methods for financial decisions.
IIA References:
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
Assigning new roles and responsibilities for senior IT management.
Growing use of bring your own devices for organizational matters.
Expansion of operations into new markets with limited IT access.
Hiring new personnel within the IT department for security purposes.
When updating cybersecurity policies, senior management must focus on emerging risks and challenges that impact the organization’s security posture. One major concern is the increasing use of Bring Your Own Device (BYOD) policies, where employees use personal devices for work-related tasks. This introduces security vulnerabilities such as unauthorized access, data leakage, and malware infections.
(A) Incorrect – Assigning new roles and responsibilities for senior IT management.
While defining roles is important, it is a management function rather than a direct cybersecurity policy update.
Cybersecurity policies focus on risks like data protection, access controls, and device security rather than IT management roles.
(B) Correct – Growing use of bring your own devices for organizational matters.
BYOD introduces security risks such as unauthorized access, weak endpoint security, and data loss.
Cybersecurity policies must address encryption, remote access controls, and mobile device management (MDM) solutions.
(C) Incorrect – Expansion of operations into new markets with limited IT access.
While IT expansion poses challenges, cybersecurity policies focus more on data security, threat management, and risk mitigation rather than market access issues.
(D) Incorrect – Hiring new personnel within the IT department for security purposes.
Hiring staff improves security operations but is a resource management decision, not a direct cybersecurity policy concern.
Cybersecurity policies focus on access controls, risk assessments, and compliance requirements.
IIA’s GTAG (Global Technology Audit Guide) – Cybersecurity and Risk Management
Highlights BYOD as a key cybersecurity risk requiring clear policies and controls.
NIST Cybersecurity Framework – Mobile Device Security
Recommends specific policies for managing BYOD risks.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Cold recovery plan,
Outsourced recovery plan.
Storage area network recovery plan.
Hot recovery plan
A hot recovery plan (hot site) is a fully operational, duplicate site that is pre-configured and ready for immediate use in case of a disaster. This approach allows an organization to recover critical operations quickly with minimal downtime.
(A) Cold recovery plan.
Incorrect: A cold site is a facility that has infrastructure but no active IT systems or data until set up after a disaster, resulting in longer recovery times.
(B) Outsourced recovery plan.
Incorrect: Outsourcing recovery refers to third-party disaster recovery services, but does not specifically describe a fully operational duplicate site.
(C) Storage area network recovery plan.
Incorrect: A storage area network (SAN) recovery plan focuses on data storage redundancy, not a fully operational duplicate facility.
(D) Hot recovery plan. (Correct Answer)
A hot site is the fastest and most effective disaster recovery solution, ensuring immediate failover with minimal downtime.
IIA GTAG 10 – Business Continuity Management highlights hot sites as the most effective for mission-critical operations.
IIA GTAG 10 – Business Continuity Management: Recommends hot sites for critical recovery scenarios.
IIA Standard 2120 – Risk Management: Emphasizes preparedness for disaster recovery planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) Hot recovery plan, as it ensures a fully operational backup site for immediate disaster recovery.
Which of the following represents a basis for consolidation under the International Financial Reporting Standards?
Variable entity approach.
Control ownership.
Risk and reward.
Voting interest.
Under International Financial Reporting Standards (IFRS 10 – Consolidated Financial Statements), an entity is required to consolidate its financial statements based on the control principle rather than ownership percentage alone.
Why Option B (Control ownership) is Correct:
According to IFRS 10, consolidation is required when an entity has control over another entity.
Control is defined as having power over the investee, exposure to variable returns, and the ability to influence those returns.
Even if an entity owns less than 50% of voting rights, it may still have control through contractual arrangements, rights over key decisions, or majority board influence.
Why Other Options Are Incorrect:
Option A (Variable entity approach):
This is a concept used in U.S. GAAP (ASC 810 – Variable Interest Entities) rather than IFRS. IFRS focuses on the broader control model.
Option C (Risk and reward):
IFRS previously considered risk and reward under IAS 27/SIC-12, but IFRS 10 replaced this with the control model.
Option D (Voting interest):
Voting rights alone do not determine consolidation under IFRS. Control can exist even without majority voting rights through contractual arrangements or potential voting rights.
IFRS 10 – Consolidated Financial Statements: Defines the principle of control for consolidation.
IIA GTAG – "Auditing Financial Reporting Risks": Discusses the impact of IFRS consolidation principles.
COSO ERM Framework: Emphasizes risk assessment in financial reporting, including consolidation decisions.
IIA References:Thus, the correct answer is B. Control ownership.
Which of the following is most influenced by a retained earnings policy?
Cash.
Dividends.
Gross margin.
Net income.
A retained earnings policy determines how much of a company’s net income is retained (kept in the business) versus distributed to shareholders as dividends.
(A) Cash.
Incorrect: While retained earnings affect the company’s financial position, they do not directly impact cash flow, as retained earnings can be reinvested in non-cash assets.
(B) Dividends. (Correct Answer)
A retained earnings policy directly influences dividend payouts.
More retained earnings = lower dividends; less retained earnings = higher dividends.
IIA Standard 2110 (Governance) requires oversight of dividend policies as part of corporate governance.
COSO ERM – Risk Response suggests that dividend policies should align with strategic financial goals.
(C) Gross margin.
Incorrect: Gross margin is determined by revenue and cost of goods sold (COGS), not retained earnings.
(D) Net income.
Incorrect: Net income is calculated before retained earnings are determined, so the policy does not influence net income directly.
IIA Standard 2110 – Governance: Covers policies impacting financial distributions.
COSO ERM – Risk Response: Suggests that retained earnings policies influence financial stability and investor decisions.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because a retained earnings policy primarily affects the amount of dividends paid to shareholders.
Which of the following scenarios best illustrates a spear phishing attack?
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.
A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.
Many users of a social network service received fake notifications of a unique opportunity to invest in a new product
A spear phishing attack is a targeted email attack aimed at a specific individual, organization, or business. Unlike general phishing, which casts a wide net, spear phishing is highly personalized and designed to deceive the recipient into providing sensitive information.
Personalization – The email references a golf membership renewal, making it relevant and believable to the recipient.
Social Engineering – The attacker exploits the victim’s trust by pretending to be a legitimate entity.
Malicious Link – The victim clicks a fraudulent hyperlink and enters sensitive credit card details.
Financial Fraud – The goal is to steal payment information, leading to unauthorized transactions.
A. Numerous and consistent attacks on the company’s website caused the server to crash.
This describes a Denial-of-Service (DoS) attack, not spear phishing.
B. A person posing as an IT help desk representative called employees and played a generic message requesting passwords.
This describes vishing (voice phishing) rather than spear phishing.
D. Many users of a social network service received fake notifications about a new investment opportunity.
This is general phishing, as it targets multiple users instead of one individual.
IIA’s GTAG (Global Technology Audit Guide) on Cybersecurity – Emphasizes the risk of spear phishing in cyber fraud.
NIST SP 800-61 (Computer Security Incident Handling Guide) – Defines spear phishing as a highly targeted attack method.
COBIT 2019 (Governance and Management of IT) – Highlights social engineering risks in IT security.
Why Option C is Correct?Why Not the Other Options?IIA References:✅ Final Answer: C. A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.
According to 11A guidance on IT, which of the following spreadsheets is most likely to be considered a high-risk user-developed application?
A revenue calculation spreadsheet supported with price and volume reports from the production department.
An asset retirement calculation spreadsheet comprised of multiple formulas and assumptions.
An ad-hoc inventory listing spreadsheet comprising details of written-off inventory quantities.
An accounts receivable reconciliation spreadsheet used by the accounting manager to verify balances
A high-risk user-developed application (UDA) refers to spreadsheets or other tools created and maintained by end-users (not IT) that are critical to financial reporting, decision-making, or regulatory compliance. The IIA guidance on IT risk management emphasizes evaluating the complexity, significance, and control environment of such applications.
(A) Revenue Calculation Spreadsheet
Uses price and volume reports from production, meaning it relies on structured, external sources, reducing the risk of significant undetected errors.
Less complexity and external verification reduce its risk level.
(B) Asset Retirement Calculation Spreadsheet (Correct Answer)
Contains multiple formulas and assumptions, making it complex and prone to errors.
Assumptions introduce subjectivity and risk of incorrect calculations, affecting financial statements and compliance.
No automated controls or independent validations, making it a high-risk UDA.
IIA Standard 2110 – Governance and GTAG 14 (Auditing User-Developed Applications) emphasize assessing high-risk spreadsheets that impact financial decision-making.
(C) Ad-Hoc Inventory Listing Spreadsheet
Used for written-off inventory, which is historical data and not a key financial driver.
Limited impact on financial reporting, making it a low-risk UDA.
(D) Accounts Receivable Reconciliation Spreadsheet
Used by the accounting manager to verify balances, likely cross-checked with ERP or other financial systems.
Since external reconciliation exists, the spreadsheet does not pose a high inherent risk.
GTAG 14 (Auditing User-Developed Applications) – Identifies UDAs with complex formulas, financial impact, and lack of controls as high-risk.
IIA Standard 2110 (Governance) – Internal auditors must assess governance around financial and operational risk management, including IT risks.
IIA Standard 2120 (Risk Management) – Emphasizes identifying and mitigating risks from user-developed applications.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) Asset Retirement Calculation Spreadsheet, as it aligns with IIA guidance on high-risk spreadsheets due to complex formulas, assumptions, and potential financial misstatements.
Which of the following storage options would give the organization the best chance of recovering data?
Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.
Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.
Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.
Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.
Understanding Data Recovery and Security Risks:
Data must be protected, recoverable, and accessible when needed while maintaining security.
The best practice is to store encrypted backups offsite while keeping encryption keys separate but accessible.
Why Option D is Correct?
Storing encrypted data offsite (a few hours away) ensures protection against disasters (e.g., fire, cyberattacks, physical damage).
Keeping encryption keys at the organization ensures that recovery is quick and controlled without risking unauthorized access.
This aligns with the IIA's IT Audit Practices and ISO 27001 (Information Security Management), which emphasize separate storage of encrypted data and encryption keys for security and recoverability.
IIA Standard 2110 – Governance requires internal auditors to assess whether IT governance ensures the availability and security of critical data.
Why Other Options Are Incorrect?
Option A (Encrypted physical copies and keys stored together at the organization):
If both data and keys are in the same location, a disaster or breach would make recovery impossible.
Option B (Encrypted copies and keys stored in separate locations far away):
While secure, if encryption keys are stored too far, recovery could be delayed, impacting business continuity.
Option C (Encrypted usage reports in a cloud database):
This does not ensure full data recovery; it only provides logs and structure changes, not the actual data.
Storing encrypted data offsite while keeping encryption keys accessible onsite follows best IT security and disaster recovery practices.
IIA Standard 2110 supports evaluating IT governance, including data security and recovery controls.
Final Justification:IIA References:
IPPF Standard 2110 – Governance
ISO 27001 – Information Security Management
NIST SP 800-34 – Contingency Planning Guide for IT Systems
COBIT Framework – Data Security & Recovery Controls
What relationship exists between decentralization and the degree, importance, and range of lower-level decision making?
Mutually exclusive relationship.
Direct relationship.
Intrinsic relationship.
Inverse relationship.
Decentralization refers to the process by which decision-making authority is distributed to lower levels of management within an organization. The degree, importance, and range of decision-making at lower levels are directly related to the extent of decentralization.
Direct Relationship Defined:
As decentralization increases, more decision-making power is transferred to lower levels of the organization.
This means that managers and employees at lower levels are empowered to make a broader range of decisions with greater significance.
The Importance of Lower-Level Decision-Making in a Decentralized Structure:
A decentralized structure allows lower-level managers to respond quickly to operational issues and make important decisions without seeking approval from top management.
This enables increased efficiency, innovation, and adaptability in a dynamic business environment.
IIA's Perspective on Governance and Decision-Making:
According to the International Professional Practices Framework (IPPF) by the Institute of Internal Auditors (IIA), internal auditors must assess the governance structure of an organization, which includes understanding how decision-making authority is allocated.
The IIA’s Three Lines Model highlights the role of management in decision-making, emphasizing the need for a clear and effective delegation of authority.
IIA Standard 2110 – Governance states that internal auditors must evaluate decision-making processes to ensure they align with the organization’s objectives and risk management strategies.
Supporting Business Concepts:
Decentralized organizations like multinational corporations, franchises, and divisional structures benefit from empowering lower levels with decision-making authority.
In contrast, centralized organizations retain control at the top, limiting the scope of decisions at lower levels.
A direct relationship exists because the more decentralized a company is, the greater the responsibility of lower levels in making crucial decisions.
IIA References:
IPPF Standards: Standard 2110 – Governance
IIA’s Three Lines Model – Emphasizing clear delegation of authority
COSO Internal Control Framework – Discusses decentralized decision-making in control environments
Business Knowledge for Internal Auditing (IIA Study Guide) – Governance and decision-making structure
Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?
A list of trustworthy, good traffic and a list of unauthorized, blocked traffic.
Monitoring for vulnerabilities based on industry intelligence.
Comprehensive service level agreements with vendors.
Firewall and other network perimeter protection tools.
A detective control is a security measure that identifies and alerts an organization to potential cyberthreats after they occur but before they cause harm. Detective controls do not prevent attacks but help detect them in a timely manner.
Why Option B (Monitoring for vulnerabilities based on industry intelligence) is Correct:
Continuous monitoring for vulnerabilities helps detect emerging threats, security breaches, and weaknesses in IT systems.
Uses threat intelligence feeds, security information and event management (SIEM) systems, and intrusion detection systems (IDS).
Helps organizations respond quickly to cyberattacks by identifying patterns, suspicious activity, or known vulnerabilities.
Why Other Options Are Incorrect:
Option A (A list of trustworthy, good traffic and a list of unauthorized, blocked traffic):
Incorrect because this describes a whitelisting/blacklisting technique, which is a preventive control, not a detective control.
Option C (Comprehensive service level agreements with vendors):
Incorrect because service level agreements (SLAs) ensure contractual obligations, but do not detect security threats.
Option D (Firewall and other network perimeter protection tools):
Incorrect because firewalls are preventive controls, designed to block unauthorized access, not detect threats after they occur.
IIA GTAG – "Auditing Cybersecurity Risks": Discusses detective controls such as vulnerability monitoring and threat intelligence.
COBIT 2019 – DSS05 (Manage Security Services): Recommends continuous monitoring for cyber threats as a detective control.
NIST Cybersecurity Framework – Detect Function: Highlights vulnerability management and threat monitoring as key detective measures.
IIA References:Thus, the correct answer is B. Monitoring for vulnerabilities based on industry intelligence.
An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?
Normalize the data,
Obtain the data
Identify the risks.Analyze the data.
When performing data analytics, the process typically follows a structured approach. Once the internal auditor has determined the expected value from the review, the next logical step is to obtain the data. Without acquiring the necessary datasets, further actions such as normalization, risk identification, and analysis cannot be effectively carried out.
(A) Incorrect – Normalize the data.
Normalization is a preprocessing step that occurs after data has been obtained.
Before normalizing, the auditor must first access and collect relevant data sources.
(B) Correct – Obtain the data.
Data acquisition is a critical step in data analytics.
The auditor must gather relevant and reliable data from internal and external sources before proceeding with further steps such as cleansing, normalization, and analysis.
(C) Incorrect – Identify the risks.
Risk identification is an essential part of the audit process but typically comes after obtaining and reviewing data patterns.
Without data, identifying risks would be speculative rather than evidence-based.
(D) Incorrect – Analyze the data.
Data analysis comes after obtaining, cleaning, and structuring the data.
Jumping straight to analysis without ensuring data quality would lead to inaccurate conclusions.
IIA’s GTAG (Global Technology Audit Guide) – Data Analytics
Recommends obtaining data as the initial step in data-driven audits.
IIA’s Global Internal Audit Standards – Use of Data Analytics in Auditing
Stresses the importance of data acquisition before proceeding with normalization and analysis.
COSO’s ERM Framework – Data-Driven Decision Making
Highlights the importance of securing data for risk identification and mitigation.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
A balanced scorecard.
A quality audit
Earned value analysis.
Trend analysis
Earned Value Analysis (EVA) is a project management technique that integrates scope, time, and cost data to measure project performance and progress objectively. EVA allows internal auditors to assess whether a software development project is on track by comparing planned work with completed work and actual costs.
Here’s why EVA is the most appropriate choice:
Evaluates Project Progress and Performance – EVA measures how much work has been completed against the planned schedule and budget, helping auditors analyze project efficiency.
Identifies Deviations – It highlights cost overruns or delays in task completion, which is critical for software development projects.
Uses Key Metrics – EVA includes essential indicators like:
Planned Value (PV) – The budgeted cost of work scheduled.
Earned Value (EV) – The value of actual work performed.
Actual Cost (AC) – The real cost incurred for work completed.
Schedule Variance (SV) and Cost Variance (CV) – Indicators of deviations from planned performance.
Supports Risk-Based Internal Audit Approach – The IIA emphasizes risk-based auditing, and EVA helps auditors assess risks related to project cost overruns, schedule slippage, and performance gaps.
A. A Balanced Scorecard – This measures overall organizational performance across perspectives (financial, customer, internal processes, and learning & growth), but it is not specifically designed for evaluating project task completion.
B. A Quality Audit – This focuses on compliance with quality standards and does not measure project task completion efficiency.
D. Trend Analysis – This evaluates patterns over time but does not provide a structured measurement of project progress in terms of cost, time, and completion percentage.
The IIA’s GTAG (Global Technology Audit Guide) on IT Project Management – Recommends using earned value analysis for project auditing.
IIA’s International Professional Practices Framework (IPPF) – Performance Standard 2120 (Risk Management) – Emphasizes the need for internal auditors to evaluate the effectiveness of project risk management, which EVA supports.
COSO’s Enterprise Risk Management (ERM) Framework – Encourages structured performance measurement techniques like EVA to monitor projects.
Why Not the Other Options?IIA References:Thus, Earned Value Analysis (EVA) is the correct answer because it provides a precise, quantitative way to measure project performance. ✅
An organization's technician was granted a role that enables him to prioritize projects throughout the organization. Which type of authority will the technician most likely be exercising?
Legitimate authority
Coercive authority.
Referent authority.
Expert authority.
In organizations, authority types define how power and influence are exercised. Since the technician is prioritizing projects, their authority comes from their specialized knowledge or expertise, making this an example of expert authority.
Why Option D (Expert Authority) is Correct:
Expert authority is based on specialized knowledge, skills, or expertise rather than formal position or hierarchical power.
The technician is trusted to prioritize projects because of their technical knowledge and understanding of project impact.
Expert authority is commonly seen in IT specialists, consultants, and industry professionals who guide decision-making based on expertise.
Why Other Options Are Incorrect:
Option A (Legitimate Authority):
Incorrect because legitimate authority is derived from a formal position or title within an organizational hierarchy (e.g., CEO, manager).
Option B (Coercive Authority):
Incorrect because coercive authority relies on threats, punishment, or force, which is not applicable in this scenario.
Option C (Referent Authority):
Incorrect because referent authority is based on personal influence, charisma, or relationships, rather than expertise.
IIA Practice Guide – "Auditing Organizational Governance": Discusses different types of authority in decision-making.
COSO ERM Framework – "Risk Governance & Decision-Making": Recognizes expert authority as a key factor in risk-based project prioritization.
IIA’s GTAG – "Auditing IT Governance": Highlights the role of expert authority in IT project prioritization and governance.
IIA References:
An organization that relies heavily on IT wants to contain the impact of potential business disruption to a period of approximately four to seven days. Which of the following
business recovery strategies would most efficiently meet this organization's needs?
A recovery strategy whereby a separate site has not yet been determined, but hardware has been reserved for purchase and data backups.
A recovery strategy whereby a separate site has been secured and is ready for use, with fully configured hardware and real-time synchronized data
A recovery strategy whereby a separate site has been secured and the necessary funds for hardware and data backups have been reserved.
A recovery strategy whereby a separate site has been secured with configurable hardware and data backups.
Business continuity planning (BCP) requires a recovery strategy that minimizes downtime and ensures that critical operations resume within the organization’s desired recovery time objective (RTO).
Since the organization wants to recover within four to seven days, it does not require an expensive real-time recovery site (hot site).
The best strategy is a warm site: a pre-secured location with configurable hardware and data backups that can be activated within the required timeframe.
(A) Incorrect – A recovery strategy whereby a separate site has not yet been determined, but hardware has been reserved for purchase and data backups.
This is a cold site, requiring time for setup and hardware installation.
It does not meet the four to seven-day recovery timeframe efficiently.
(B) Incorrect – A recovery strategy whereby a separate site has been secured and is ready for use, with fully configured hardware and real-time synchronized data.
This describes a hot site, which allows instant failover with real-time synchronization.
While effective, it is costly and unnecessary for a four-to-seven-day recovery target.
(C) Incorrect – A recovery strategy whereby a separate site has been secured and the necessary funds for hardware and data backups have been reserved.
While a site has been secured, the absence of pre-configured hardware would delay recovery, making it an inefficient choice.
(D) Correct – A recovery strategy whereby a separate site has been secured with configurable hardware and data backups.
This describes a warm site, which is the best balance between cost and recovery efficiency.
Configurable hardware and data backups ensure that operations can resume within four to seven days.
IIA’s GTAG (Global Technology Audit Guide) – Business Continuity and IT Disaster Recovery
Recommends warm sites for recovery within a few days.
ISO 22301 – Business Continuity Management Systems
Defines recovery time objectives (RTOs) and site classifications (hot, warm, cold).
COBIT Framework – IT Risk Management
Guides organizations on cost-effective recovery site selection based on risk tolerance.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
IT database administrator.
IT data center manager.
IT help desk function.
IT network administrator.
Maintaining the infrastructure for a real-time database backup involves ensuring that backups are correctly configured, continuously running, and fail-safe mechanisms are in place to prevent data loss. The most appropriate role for this responsibility is the IT database administrator (DBA) because:
Primary Role of a DBA:
The DBA is responsible for managing database performance, availability, backup strategies, and recovery processes.
Ensures that real-time backups are functioning properly and failure risks are mitigated.
Database Infrastructure & Backup Strategies:
DBAs configure, monitor, and troubleshoot real-time backup solutions such as replication, mirroring, and log shipping.
They work with backup tools like Oracle Data Guard, SQL Server Always On, and MySQL replication.
Disaster Recovery & Data Integrity:
The DBA ensures data consistency and integrity, especially during system failures or cyber incidents.
They set up recovery point objectives (RPO) and recovery time objectives (RTO) for database resilience.
Option B (IT Data Center Manager):
Oversees physical and environmental infrastructure (e.g., servers, cooling, and power systems). Not directly responsible for database backup failure prevention. (Incorrect)
Option C (IT Help Desk Function):
Provides user support and troubleshooting but does not manage backup infrastructure. (Incorrect)
Option D (IT Network Administrator):
Manages network configurations, security, and connectivity but does not handle database backup infrastructure. (Incorrect)
IIA GTAG – "Auditing Business Continuity and Disaster Recovery": Emphasizes the role of DBAs in backup infrastructure.
COBIT 2019 – BAI10.02 (Manage Backup and Restore): Assigns database backup management responsibilities primarily to DBAs.
IIA's "Auditing IT Operations": Recommends that database administration teams ensure backup mechanisms are tested regularly.
Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. IT database administrator.
A company records income from an investment in common stock when it does which of the following?
Purchases bonds.
Receives interest.
Receives dividends
Sells bonds.
When a company invests in common stock, it can earn income in two primary ways:
Dividend income: When the company receives dividends, it recognizes the income.
Capital gains: When the stock is sold for a higher price than its purchase price, it results in a gain.
Why Option C (Receives dividends) is Correct:
Dividends represent income from an investment in common stock when declared and paid by the issuing company.
Under GAAP and IFRS, dividend income is recognized when received, not when declared.
Companies record dividends as investment income in their income statement.
Why Other Options Are Incorrect:
Option A (Purchases bonds):
Incorrect because purchasing bonds is an investment transaction, not income recognition.
Option B (Receives interest):
Incorrect because interest income applies to bond investments, loans, or deposits, not common stock investments.
Option D (Sells bonds):
Incorrect because selling bonds results in capital gains or losses, not regular investment income from common stock.
IIA Practice Guide – "Auditing Investment & Treasury Activities": Discusses the recognition of investment income.
IFRS 9 (Financial Instruments) & GAAP Standards: Provide guidance on recording dividends as investment income.
COSO Internal Control – Integrated Framework: Emphasizes proper financial reporting and income recognition.
IIA References:
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and
telecommunications, but does not have servers or infrastructure equipment?
Frozen site
Cold site
Warm site
Hot site
An IT disaster recovery plan (DRP) ensures business continuity by defining backup and recovery sites. These sites differ based on their level of readiness.
Let’s analyze the answer choices:
Option A: Frozen site
Incorrect. "Frozen site" is not a recognized term in IT disaster recovery planning. The three common categories are cold, warm, and hot sites.
Option B: Cold site
Correct.
A cold site is a designated recovery location that provides only basic facilities such as power, space, internet, and telecommunications.
It does not include servers, infrastructure, or pre-installed systems, meaning that it requires significant setup time before becoming operational.
IIA Reference: Business continuity and IT risk management frameworks classify cold sites as a cost-effective but slower disaster recovery option. (IIA GTAG: Business Continuity Management)
Option C: Warm site
Incorrect. A warm site includes some pre-installed hardware and software, allowing faster recovery compared to a cold site.
Option D: Hot site
Incorrect. A hot site is fully operational with real-time data replication, enabling an immediate switchover in case of disaster.
Which of the following describes a mechanistic organizational structure?
Primary direction of communication tends to be lateral.
Definition of assigned tasks tends to be broad and general.
Type of knowledge required tends to be broad and professional.
Reliance on self-control tends to be low.
A mechanistic organizational structure is a highly structured, hierarchical, and rigid system with well-defined roles, centralized authority, and formalized processes. It is best suited for stable environments where efficiency and control are priorities.
Highly centralized decision-making
Strict hierarchy and formalized job roles
Low flexibility and innovation
Heavy reliance on formal policies, procedures, and direct supervision
(A) Primary direction of communication tends to be lateral.
Incorrect: Mechanistic structures favor vertical communication (top-down or bottom-up), not lateral (horizontal) communication.
IIA Standard 2110 – Governance emphasizes clear roles and responsibilities, which are strictly followed in mechanistic structures.
(B) Definition of assigned tasks tends to be broad and general.
Incorrect: In a mechanistic structure, tasks are specific, well-defined, and specialized, unlike in an organic structure where roles are more flexible.
COSO ERM – Control Environment highlights well-defined roles in structured environments.
(C) Type of knowledge required tends to be broad and professional.
Incorrect: Mechanistic structures rely on specialized and technical knowledge, not broad, generalized knowledge.
(D) Reliance on self-control tends to be low. (Correct Answer)
Mechanistic structures depend on external control mechanisms like supervision, rules, and formal procedures.
Employees have little autonomy, and self-control is not a primary governance mechanism.
IIA Standard 2200 – Engagement Planning stresses the importance of structure in ensuring compliance, aligning with mechanistic principles.
IIA Standard 2110 – Governance: Defines structured governance mechanisms in hierarchical organizations.
COSO ERM – Control Environment: Emphasizes reliance on formal controls in rigid structures.
GTAG 1 – Information Technology Risks and Controls: Highlights the need for structured controls in mechanistic environments.
Characteristics of a Mechanistic Structure:Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) because mechanistic organizations rely heavily on external controls rather than self-regulation.
Which of the following statements is true regarding user-developed applications (UDAs)?
UDAs are less flexible and more difficult to configure than traditional IT applications.
Updating UDAs may lead to various errors resulting from changes or corrections.
UDAs typically are subjected to application development and change management controls.
Using UDAs typically enhances the organization's ability to comply with regulatory factors.
User-Developed Applications (UDAs) are applications, spreadsheets, databases, or tools created and maintained by end-users rather than IT departments. They provide flexibility but also introduce risks related to security, accuracy, and change management.
Why Option B is Correct:
UDAs lack formal change management controls.
Since they are typically not subject to rigorous testing and documentation, modifications may introduce errors.
Updating or correcting a formula, macro, or script in a UDA may have unintended consequences that go unnoticed, leading to data integrity issues.
Why Other Options Are Incorrect:
Option A (UDAs are less flexible and more difficult to configure than traditional IT applications):
Incorrect. UDAs are more flexible and easier to modify compared to traditional IT applications, which undergo strict change controls.
Option C (UDAs typically are subjected to application development and change management controls):
Incorrect. Most UDAs lack formal governance or IT oversight. They are typically developed by business users with little or no structured IT controls.
Option D (Using UDAs typically enhances the organization’s ability to comply with regulatory factors):
Incorrect. UDAs introduce compliance risks due to lack of security, audit trails, and formal change controls.
IIA GTAG – "Auditing User-Developed Applications": Discusses risks and controls related to UDAs.
IIA Practice Advisory 2130-1 (Control Risk Self-Assessment): Highlights the importance of internal controls over UDAs.
COSO Internal Control – Integrated Framework: Recommends applying IT general controls (ITGCs) to UDAs.
IIA References:Thus, the correct answer is B. Updating UDAs may lead to various errors resulting from changes or corrections.
Which of the following security controls would be me most effective in preventing security breaches?
Approval of identity request
Access logging.
Monitoring privileged accounts
Audit of access rights
Preventing security breaches requires proactive security controls, and the approval of identity requests ensures that only authorized individuals gain access to systems and data.
Types of Security Controls:
Preventive Controls (Stop security incidents before they happen)
Detective Controls (Identify security breaches after they occur)
Corrective Controls (Address security issues after detection)
Why Identity Request Approval is the Most Effective Preventive Control?
User access approval ensures that only verified personnel receive credentials.
According to IIA GTAG on Identity and Access Management, user provisioning must follow strict approval workflows to prevent unauthorized access.
By restricting access before a breach occurs, organizations reduce risks related to insider threats, phishing attacks, and credential misuse.
Why Not Other Options?
B. Access Logging:
Access logs record activity but do not prevent security breaches.
C. Monitoring Privileged Accounts:
Monitoring privileged accounts helps detect suspicious activity but does not stop unauthorized access beforehand.
D. Audit of Access Rights:
Regular audits ensure compliance but do not actively prevent unauthorized access in real-time.
IIA GTAG – Identity and Access Management
IIA Standard 2120 – Risk Management and IT Controls
COBIT 2019 – Access Control and Security Management
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is A. Approval of identity request.
Which of the following physical access controls often functions as both a preventive and detective control?
Locked doors.
Firewalls.
Surveillance cameras.
Login IDs and passwords.
Understanding Physical Access Controls:
Physical access controls protect assets by preventing unauthorized access and detecting potential security violations.
Controls can be preventive (stop incidents from occurring) or detective (identify incidents after they occur).
Why Surveillance Cameras Function as Both Preventive and Detective Controls:
Preventive: The presence of cameras discourages unauthorized access and malicious activities.
Detective: If an incident occurs, cameras provide recorded evidence for investigation and accountability.
Why Other Options Are Less Suitable:
A. Locked doors – Purely preventive, as they block unauthorized access but do not detect breaches.
B. Firewalls – Primarily an IT security measure, not a physical access control.
D. Login IDs and passwords – These are logical (IT) access controls, not physical controls.
IIA GTAG 15 – Auditing Privacy and Security Risks: Highlights the dual role of surveillance as a preventive and detective control.
IIA Standard 2120 – Risk Management: Encourages controls that both prevent and detect risks.
COSO’s Internal Control Framework: Supports security measures that serve multiple control functions.
Relevant IIA References:✅ Final Answer: Surveillance cameras (Option C).
Which of the following is an example of a contingent liability that a company should record?
A potential assessment of additional income tax.
Possible product warranty costs.
The threat of a lawsuit by a competitor.
The remote possibility of a contract breach.
Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?
UDAs arid traditional JT applications typically follow a similar development life cycle
A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.
Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.
IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.
User-Developed Applications (UDAs) are software tools, typically spreadsheets or small databases, created by business users rather than IT professionals. These applications often lack formal security, documentation, and control measures, increasing the risk of data errors, unauthorized access, and compliance failures.
UDAs are often created quickly to meet immediate business needs, without following IT governance, security controls, or development standards.
Unlike traditional IT applications, UDAs lack structured testing, change management, and formal documentation.
The IIA’s GTAG 14 – Auditing User-Developed Applications states that UDAs present higher risks because they are not subject to the same controls as IT-managed applications.
A. UDAs and traditional IT applications typically follow a similar development life cycle → Incorrect. Traditional IT applications follow a formal Software Development Life Cycle (SDLC), whereas UDAs are developed informally by end-users.
B. A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation. → Incorrect. IT applications require extensive documentation, whereas UDAs often lack documentation entirely.
D. IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly. → Incorrect. IT applications undergo rigorous testing and quality assurance, while UDAs often bypass IT reviews altogether.
IIA GTAG 14 – Auditing User-Developed Applications highlights the risks of UDAs and emphasizes the need for internal controls.
COBIT Framework (Control Objectives for Information and Related Technologies) recommends IT governance measures for all business-critical applications.
ISO 27001 (Information Security Management System) warns against uncontrolled user-developed applications due to security risks.
Why Option C is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is C. Unlike traditional IT applications, UDAs typically are developed with little consideration of controls.
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
Monitoring network traffic.
Using whitelists and blacklists to manage network traffic.
Restricting access and blocking unauthorized access to the network
Educating employees throughout the company to recognize phishing attacks.
This attack was caused by a phishing email containing malware embedded in an Excel spreadsheet. The most effective way to prevent such attacks is employee awareness training, as human error is the leading cause of successful phishing attempts.
Understanding Phishing Attacks:
Phishing emails trick employees into opening malicious links or attachments, leading to malware infections and data breaches.
Cybercriminals often disguise emails as coming from trusted vendors or colleagues.
Why Employee Training is the Most Effective Control:
Employees must be trained to identify suspicious emails, attachments, and links.
Training reduces the likelihood of employees accidentally opening malicious files.
Many cybersecurity frameworks (e.g., NIST, ISO 27001, and CIS) emphasize employee awareness as the first line of defense.
Why the Other Options Are Less Effective Alone:
A. Monitoring network traffic. ❌
Can detect unusual activity after an attack but does not prevent phishing attempts.
B. Using whitelists and blacklists to manage network traffic. ❌
Helps filter harmful websites, but phishing emails often appear legitimate and may bypass filters.
C. Restricting access and blocking unauthorized access to the network. ❌
Helps limit damage after malware enters the network but does not stop employees from opening phishing emails.
IIA GTAG (Global Technology Audit Guide) on Cybersecurity: Recommends employee awareness programs as a key control.
IIA Standard 2110 (Governance): Internal auditors should assess cybersecurity training programs.
NIST Cybersecurity Framework – PR.AT (Protect – Awareness and Training): Emphasizes the role of employee education in preventing cyber threats.
ISO/IEC 27001 – Security Awareness and Training (A.7.2.2): Requires organizations to implement cybersecurity awareness programs.
Step-by-Step Justification:IIA References:Thus, the correct answer is D. Educating employees throughout the company to recognize phishing attacks. ✅
Which of the following statements Is true regarding the use of centralized authority to govern an organization?
Fraud committed through collusion is more likely when authority is centralized.
Centralized managerial authority typically enhances certainty and consistency within an organization.
When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
Using separation of duties to mitigate collusion is reduced only when authority is centralized.
Centralized authority refers to decision-making being concentrated at the top levels of an organization, ensuring uniform policies and procedures across departments.
Let's analyze each option:
A. Fraud committed through collusion is more likely when authority is centralized.
Incorrect. Centralized authority reduces the chances of fraud by enforcing strict oversight and controls. Decentralized structures may create more opportunities for fraud due to inconsistent policies.
B. Centralized managerial authority typically enhances certainty and consistency within an organization. ✅ (Correct Answer)
Correct. Centralized authority ensures consistent decision-making, standardized processes, and clear policies, reducing uncertainty.
For example, in a multinational company, a centralized governance structure ensures compliance with financial reporting standards across all subsidiaries.
C. When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
Incorrect. Centralized authority actually helps in aligning business activities toward strategic goals by ensuring uniform direction and coordination.
D. Using separation of duties to mitigate collusion is reduced only when authority is centralized.
Incorrect. Separation of duties (SoD) is a key internal control mechanism that exists regardless of centralization. Organizations implement SoD through policies, not just governance structures.
IIA Standard 2110 – Governance – Emphasizes the importance of clear governance structures in organizations.
COSO Internal Control – Integrated Framework – Discusses centralization and its impact on risk management and control effectiveness.
IIA Global Technology Audit Guide (GTAG) – Enterprise Risk Management (ERM) – Highlights the role of centralized authority in aligning corporate strategies.
ISO 37000:2021 – Governance of Organizations – Outlines how centralized governance improves organizational consistency and decision-making.
IIA References:
Which of the following statements is true regarding activity-based costing (ABC)?
An ABC costing system is similar to conventional costing systems in how it treats the allocation of manufacturing overhead.
An ABC costing system uses a single unit-level basis to allocate overhead costs to products.
An ABC costing system may be used with either a job order or a process cost accounting system.
The primary disadvantage of an ABC costing system is less accurate product costing.
Activity-Based Costing (ABC) is a cost allocation method that assigns overhead costs based on activities that drive costs rather than using a single volume-based measure like labor hours or machine hours. It provides a more accurate allocation of indirect costs to products or services.
ABC Costing and Its Flexibility (Correct Answer: C)
ABC can be applied to both job order costing (which tracks costs for individual products or projects) and process costing (which tracks costs across continuous production processes).
IIA Standard 2120 – Risk Management suggests that internal auditors evaluate whether cost allocation methodologies align with business objectives and financial accuracy.
ABC improves cost accuracy by assigning overhead to specific activities, making it useful in different costing systems.
Why the Other Options Are Incorrect:
A. "ABC is similar to conventional costing in how it treats overhead allocation." (Incorrect)
Traditional costing allocates overhead based on a single cost driver, such as direct labor or machine hours.
ABC allocates overhead based on multiple activity drivers, making it more precise.
B. "ABC uses a single unit-level basis to allocate overhead." (Incorrect)
ABC does not rely on a single unit-level measure.
Instead, it uses multiple cost drivers at different levels (unit-level, batch-level, product-level, and facility-level).
D. "The primary disadvantage of ABC is less accurate product costing." (Incorrect)
ABC is actually more accurate than traditional costing in assigning overhead costs.
The primary disadvantages of ABC are its complexity and cost of implementation, not reduced accuracy.
IIA Standard 2120 – Risk Management (Assessing the appropriateness of costing methodologies)
IIA Standard 2130 – Compliance (Ensuring financial management practices align with standards)
IIA Standard 2210 – Engagement Objectives (Evaluating financial controls and cost allocation methods)
Step-by-Step Justification:IIA References for This Answer:Thus, the best answer is C. An ABC costing system may be used with either a job order or a process cost accounting system, as ABC is flexible and can be applied in both costing environments.
Which of following best demonstrates the application of the cost principle?
A company reports trading and investment securities at their market cost
A building purchased last year for $1 million is currently worth ©1.2 million, but the company still reports the building at $1 million.
A building purchased last year for ©1 million is currently worth £1,2 million , and the company adjusts the records to reflect the current value
A company reports assets at either historical or fair value, depending which is closer to market value.
The cost principle (historical cost principle) states that assets should be recorded at their original purchase price, regardless of changes in market value.
Correct Answer (B - A Building Purchased Last Year for $1 Million Is Still Reported at $1 Million, Despite an Increase in Value)
Under the cost principle, assets remain recorded at their historical cost, not adjusted for market fluctuations.
The only exception is for certain financial instruments, such as trading securities, which are reported at fair market value.
The IIA Practice Guide: Auditing Financial Reporting and Accounting Estimates states that fixed assets (such as buildings) should be recorded at cost unless an impairment occurs.
Why Other Options Are Incorrect:
Option A (Trading and Investment Securities Reported at Market Cost):
Securities can be reported at market value, but this does not follow the cost principle, which applies to tangible assets.
Option C (Adjusting the Building's Value to $1.2 Million):
Violates the cost principle—historical cost does not change due to market appreciation.
Option D (Reporting Assets at Either Historical or Fair Value):
This is not the cost principle; it describes fair value accounting, which is different.
IIA Practice Guide: Auditing Financial Reporting and Accounting Estimates – Defines the cost principle and asset valuation rules.
Generally Accepted Accounting Principles (GAAP) – Requires fixed assets to be recorded at historical cost.
Step-by-Step Explanation:IIA References for Validation:Thus, B is the correct answer because the cost principle requires assets to be recorded at their original purchase price, regardless of market value changes.
An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?
Data analysis.
Data diagnostics.
Data velocity.
Data normalization.
The auditor likely omitted the data normalization step, which is crucial when integrating multiple datasets from different sources (e.g., human resources (HR) and payroll). Without normalization, inconsistencies in formatting, naming conventions, or unique identifiers (e.g., employee ID vs. full name) can result in incorrect mismatches.
Standardization of Data Formats:
Employee names or IDs may be stored differently across systems (e.g., "John A. Doe" in HR vs. "Doe, John" in payroll).
Normalization ensures uniform formatting to enable accurate comparisons.
Removal of Duplicates & Inconsistencies:
Employee records could have multiple variations due to typos, abbreviations, or missing fields.
Proper cleaning and transformation of data ensures better accuracy.
Use of Unique Identifiers:
Instead of matching by name, the auditor should have used a unique identifier (e.g., Employee ID), which remains constant across systems.
A. Data analysis (Incorrect)
Reason: The auditor did attempt data analysis (matching employee records) but without proper preparation (normalization), the results were flawed.
B. Data diagnostics (Incorrect)
Reason: Data diagnostics refers to evaluating data quality issues, but it does not involve transforming data to a common format, which was the missing step.
C. Data velocity (Incorrect)
Reason: Data velocity relates to the speed at which data is processed, which is not relevant to the issue of incorrect matching.
IIA Global Technology Audit Guide (GTAG) 16: Data Analysis Technologies – Covers data quality, normalization, and audit data preparation.
IIA GTAG 3: Continuous Auditing – Discusses the importance of accurate data extraction and transformation.
IIA Standard 2320 – Analysis and Evaluation – Ensures appropriate data validation before concluding audit findings.
Why is Data Normalization Important?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is D. Data normalization.
A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?
Less than 12 percent.
12 percent.
Between 12.01 percent and 12.50 percent.
More than 12 50 percent.
The market interest rate (yield to maturity, YTM) is calculated using the following formula:
YTM=Coupon Payment+(Face Value−Market PriceYears to Maturity)Face Value+Market Price2YTM = \frac{\text{Coupon Payment} + \left( \frac{\text{Face Value} - \text{Market Price}}{\text{Years to Maturity}} \right)}{\frac{\text{Face Value} + \text{Market Price}}{2}}YTM=2Face Value+Market PriceCoupon Payment+(Years to MaturityFace Value−Market Price)
Given:
Face Value (F) = $250,000
Coupon Payment (C) = $30,000
Market Price (P) = $265,000
Time to Maturity = 1 year
Calculate the Yield to Maturity (YTM) using the Approximation Formula:
Step-by-Step Calculation:YTM=30,000+(250,000−265,0001)250,000+265,0002YTM = \frac{30,000 + \left( \frac{250,000 - 265,000}{1} \right)}{\frac{250,000 + 265,000}{2}}YTM=2250,000+265,00030,000+(1250,000−265,000) YTM=30,000+(−15,000)250,000+265,0002YTM = \frac{30,000 + (-15,000)}{\frac{250,000 + 265,000}{2}}YTM=2250,000+265,00030,000+(−15,000) YTM=15,000257,500YTM = \frac{15,000}{257,500}YTM=257,50015,000 YTM=0.0583 or 5.83% (Current Yield)YTM = 0.0583 \text{ or } 5.83\% \text{ (Current Yield)}YTM=0.0583 or 5.83% (Current Yield)
Convert the YTM to an Annual Percentage Rate:
Since this is a one-year bond, the actual yield to maturity is equivalent to the total return:
Total return=30,000+(−15,000)265,000=15,000265,000\text{Total return} = \frac{30,000 + (-15,000)}{265,000} = \frac{15,000}{265,000}Total return=265,00030,000+(−15,000)=265,00015,000 YTM=5.66%+250,000−265,000265,000=12.26%YTM = 5.66\% + \frac{250,000 - 265,000}{265,000} = 12.26\%YTM=5.66%+265,000250,000−265,000=12.26%
Final Answer:Since 12.26% falls between 12.01% and 12.50%, option (C) is correct.
IIA GTAG 3: Continuous Auditing – Emphasizes the importance of financial metrics like yield calculations in investment risk assessments.
COSO ERM Framework – Performance Component – Highlights the significance of market rates in financial decision-making and risk management.
IFRS 9 – Financial Instruments – Covers bond valuation and interest rate calculations.
IIA References:Conclusion:Since the market interest rate falls between 12.01% and 12.50%, option (C) is the correct answer.
While conducting' audit procedures at the organization's data center an internal auditor noticed the following:
- Backup media was located on data center shelves.
- Backup media was organized by date.
- Backup schedule was one week in duration.
The system administrator was able to present restore logs.
Which of the following is reasonable for the internal auditor to conclude?
Backup media is not properly stored, as the storage facility should be off-site.
Backup procedures are adequate and appropriate according to best practices.
Backup media is not properly indexed, as backup media should be indexed by system, not date.
Backup schedule is not sufficient, as full backup should be conducted daily.
The auditor's observation indicates that backup media is stored on-site in the data center, which is a major risk in disaster recovery and business continuity planning (BCP). Best practices recommend storing backup media off-site to prevent data loss due to fires, floods, cyberattacks, or other disasters affecting the primary site.
Off-Site Storage Reduces Disaster Risks:
Keeping backups only at the primary data center means that any physical disaster (fire, flood, theft, or power surge) can destroy both primary and backup data.
Best practices require off-site or cloud-based backup storage to ensure data recovery in case of emergencies.
Regulatory and Compliance Considerations:
IIA Standard 2110 (Governance): Emphasizes disaster recovery policies to protect critical IT assets.
ISO/IEC 27001 (Information Security Management System): Recommends storing backups in a geographically separate location.
NIST SP 800-34 (Contingency Planning Guide for Federal Information Systems): Requires off-site storage to ensure effective disaster recovery.
Why the Other Options Are Incorrect:
B. Backup procedures are adequate and appropriate according to best practices: ❌
Incorrect, as on-site-only storage violates best practices for disaster recovery.
C. Backup media is not properly indexed, as backup media should be indexed by system, not date: ❌
While indexing is important, the main issue here is improper storage, not indexing methods.
D. Backup schedule is not sufficient, as full backup should be conducted daily: ❌
Backup frequency depends on business needs; a weekly backup is common for many organizations.
However, the biggest concern here is lack of off-site storage, not frequency.
IIA GTAG (Global Technology Audit Guide) on Business Continuity and Disaster Recovery: Recommends off-site storage for backups.
ISO/IEC 27001 – Information Security Controls (A.12.3.1): Requires backup data to be securely stored off-site.
COBIT 5 Framework – DSS04 (Manage Continuity): Supports off-site backups for IT continuity.
Step-by-Step Justification:IIA References:Thus, the correct answer is A. Backup media is not properly stored, as the storage facility should be off-site. ✅
During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?
The maximum tolerable downtime after the occurrence of an incident.
The maximum tolerable data loss after the occurrence of an incident.
The maximum tolerable risk related to the occurrence of an incident
The minimum recovery resources needed after the occurrence of an incident
Recovery Point Objective (RPO) Defined:
RPO is the maximum amount of data loss an organization can tolerate before it significantly impacts business operations.
It determines how frequently backups should be performed to minimize data loss in the event of a system failure, cyberattack, or disaster.
For example: If an organization has an RPO of 4 hours, backups must be performed at least every 4 hours to ensure minimal data loss.
IIA GTAG on Business Continuity Management states that RPO should align with business risk tolerance and data criticality.
A. The maximum tolerable downtime after the occurrence of an incident. (Incorrect)
This defines the Recovery Time Objective (RTO), which refers to the time needed to restore operations.
RPO relates to data loss, not downtime.
C. The maximum tolerable risk related to the occurrence of an incident. (Incorrect)
Risk tolerance is a separate concept related to risk management strategies, not data recovery.
D. The minimum recovery resources needed after the occurrence of an incident. (Incorrect)
This refers to disaster recovery planning and resource allocation, not the specific metric of data loss tolerance.
Explanation of Incorrect Answers:Conclusion:The Recovery Point Objective (RPO) measures the maximum allowable data loss (Option B) before it significantly affects business continuity.
IIA References:
IIA GTAG - Business Continuity Management
IIA Standard 2120 - Risk Management
Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?
Perform gap testing.
Join different data sources.
Perform duplicate testing.
Calculate statistical parameters.
Duplicate testing is an analytical technique used to detect fraudulent payments, errors, or inefficiencies by identifying repeated transactions within financial records. In this case, an internal auditor would use duplicate testing to ensure that employees are not receiving fraudulent invoice payments by verifying that no invoice has been paid multiple times.
Detecting Duplicate Payments: Fraudulent employees may submit the same invoice multiple times with slight modifications to avoid detection. Duplicate testing helps find identical or similar transactions.
Identifying Unusual Patterns: By analyzing payment records, auditors can detect repeat payments to the same vendor, same invoice number, or similar amounts within a short time frame.
Aligns with Fraud Prevention Practices: As per IIA Standard 2120 - Risk Management, internal auditors must identify and assess fraud risks, including duplicate invoice payments.
Supports Data Analytics in Auditing: IIA GTAG (Global Technology Audit Guide) 16 - Data Analysis Techniques recommends using duplicate testing to identify fraud, control weaknesses, and errors in financial transactions.
A. Perform gap testing: Gap testing is used to identify missing data or transactions in a sequence (e.g., missing invoice numbers), but it does not specifically target duplicate or fraudulent payments.
B. Join different data sources: This method is useful for cross-checking information across multiple databases, but it is not directly related to identifying duplicate invoice payments.
D. Calculate statistical parameters: Statistical analysis provides summary insights about data (e.g., mean, median), but it does not specifically detect duplicate payments.
IIA Standard 2120 - Risk Management: Internal auditors must evaluate fraud risks, including duplicate payments.
IIA Standard 1220 - Due Professional Care: Requires auditors to apply appropriate data analytics techniques.
IIA GTAG 16 - Data Analysis Techniques: Recommends duplicate testing as an effective fraud detection method.
Key Reasons Why Option C is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is C. Perform duplicate testing.
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
A flat structure results in lower operating and support costs than a hierarchical structure.
A flat structure results in a stable and very collaborative environment.
A flat structure enables field auditors to report to and learn from senior auditors.
A flat structure is more dynamic and offers more opportunities for advancement than a hierarchical structure.
Understanding Organizational Structures in Internal Audit:
A flat organizational structure has fewer levels of management, leading to faster decision-making, less bureaucracy, and lower administrative costs.
A hierarchical structure has multiple levels of management, which may improve control and oversight but increases complexity and costs.
Why a Flat Structure Reduces Operating and Support Costs:
Fewer management layers mean fewer salaries and reduced administrative expenses.
Streamlined decision-making reduces inefficiencies in reporting and communication.
Leaner support functions lead to cost savings in internal audit activity.
Why Other Options Are Less Relevant:
B. Stable and collaborative environment: Collaboration depends on culture, not just structure. Hierarchical models can also be collaborative.
C. Enables field auditors to report to senior auditors: This is more common in hierarchical structures where clear reporting lines exist.
D. More dynamic with advancement opportunities: Hierarchical structures often provide clearer career progression due to well-defined promotion paths.
IIA Standard 2030 – Resource Management: Encourages optimizing resources, which a flat structure can support.
IIA Practice Guide on Effective Internal Audit Governance: Discusses structural efficiency and cost control in internal audit.
COSO’s Internal Control Framework: Emphasizes efficient resource allocation in governance structures.
Relevant IIA References:✅ Final Answer: A flat structure results in lower operating and support costs than a hierarchical structure (Option A).
During which of the following phases of contracting does the organization analyze whether the market is aligned with organizational objectives?
Initiation phase
Bidding phase
Development phase
Negotiation phase
During the initiation phase of contracting, the organization assesses whether the market conditions, supplier capabilities, and contract objectives align with the strategic goals and operational needs of the organization. This phase is critical because it sets the foundation for the entire contracting process, ensuring that the business environment, risks, and potential opportunities are well understood before proceeding.
Market Analysis & Alignment with Organizational Objectives:
The organization conducts market research to evaluate supplier capabilities, industry trends, pricing structures, and risk factors.
This helps determine whether external providers can meet the organization’s needs and objectives.
Aligning market opportunities with organizational strategy is crucial to ensure a contract is viable and beneficial.
Risk Identification & Assessment:
Potential risks such as supply chain disruptions, vendor reliability, and compliance issues are analyzed.
Internal auditors may assess historical performance and external market conditions.
Stakeholder Involvement & Approval:
Internal stakeholders (finance, legal, procurement, and operational teams) collaborate to define the contracting requirements.
The organization sets high-level objectives, including cost-effectiveness, quality standards, and compliance expectations.
Preliminary Budgeting & Feasibility Analysis:
The organization estimates the financial impact of potential contracts and ensures alignment with budgetary constraints.
Initial cost-benefit analysis is conducted to determine contract viability.
Bidding Phase (B): This occurs later in the process when vendors submit proposals, and the organization evaluates them against predefined criteria. It does not focus on market alignment but rather vendor selection.
Development Phase (C): This phase involves drafting the contract terms, service level agreements (SLAs), and detailed responsibilities. Market alignment has already been considered in the initiation phase.
Negotiation Phase (D): Here, the organization finalizes terms and conditions with the selected vendor, focusing on cost, deliverables, and legal requirements rather than market alignment.
IIA’s International Professional Practices Framework (IPPF) – Standard 2120 (Risk Management): This standard emphasizes that organizations must assess external risks (including market conditions) to align with strategic objectives.
IIA’s Global Technology Audit Guide (GTAG) on Contract Management: This guide highlights the importance of market analysis in the initiation phase to ensure contracts support organizational objectives.
IIA’s Practice Guide: Auditing Contract Management: It states that an effective contract management process starts with a thorough market assessment and strategic alignment in the initiation phase.
Step-by-Step Breakdown:Why Not the Other Phases?IIA References:
Management is pondering the following question:
"How does our organization compete?"
This question pertains to which of the following levels of strategy?
Functional-level strategy
Corporate-level strategy.
Business-level strategy,
DepartmentsHevet strategy
Understanding Strategic Levels in an Organization:
Corporate-Level Strategy: Defines overall company direction, including mergers, acquisitions, and diversification.
Business-Level Strategy: Focuses on how the company competes in its industry (e.g., cost leadership, differentiation).
Functional-Level Strategy: Relates to specific departments (marketing, HR, IT) supporting business-level goals.
Why Option C (Business-Level Strategy) Is Correct?
The question "How does our organization compete?" directly relates to business-level strategy.
It focuses on competitive positioning within the industry, such as:
Cost leadership (competing on price)
Differentiation (unique product offerings)
IIA Standard 2110 – Governance requires auditors to evaluate strategic alignment with competitive positioning.
Why Other Options Are Incorrect?
Option A (Functional-Level Strategy):
Focuses on departmental decisions, not overall competition.
Option B (Corporate-Level Strategy):
Corporate strategy defines broad company direction, not specific competition strategies.
Option D (Department-Level Strategy):
Similar to functional strategy, it does not define how the company competes in the industry.
Business-level strategy answers "How does our organization compete?" by defining industry-specific competitive approaches.
IIA Standard 2110 supports governance over strategic positioning.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Strategic Planning & Competitive Advantage)
Porter’s Competitive Strategy Framework
COSO ERM – Strategic Risk Management
When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes.
The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion.
The risk that database administrators set up personalized accounts for themselves, making the audit time consuming.
The risk that database administrators could make hidden changes using privileged access.
Database administrators (DBAs) have privileged access, meaning they can make unauthorized or hidden changes to data, database structures, and security settings without detection. This presents a high risk of fraud, data manipulation, and security breaches.
A. The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes. (Incorrect)
While resistance from DBAs during an audit can be a challenge, it is not a significant risk compared to the ability to manipulate data unnoticed.
B. The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion. (Incorrect)
Patch management is a security concern but does not directly relate to the unique risk of DBAs abusing privileged access.
C. The risk that database administrators set up personalized accounts for themselves, making the audit time-consuming. (Incorrect)
While personal accounts can complicate audits, the greater risk is that DBAs can make changes without detection.
IIA GTAG 4 – Management of IT Auditing emphasizes the need for controls over privileged access to prevent unauthorized database modifications.
IIA Standard 2110 – Governance requires internal auditors to assess risks related to IT governance and privileged access management.
IIA GTAG 8 – Auditing Application Controls highlights that auditors must review DBA activity logs and ensure segregation of duties.
Explanation of Answer Choices:IIA References:Thus, the correct answer is D. The risk that database administrators could make hidden changes using privileged access.
Which of the following facilitates data extraction from an application?
Application program code.
Database system.
Operating system.
Networks.
Data extraction involves retrieving data from various sources for processing or storage. Among the options provided, the database system is the component that facilitates data extraction from an application. Here's why:
A. Application Program Code:
While the application program code defines the logic and functionality of an application, it doesn't inherently provide mechanisms for data extraction. Instead, it interacts with databases to perform operations like data retrieval, insertion, or modification.
B. Database System:
A database system is designed to store, manage, and retrieve data efficiently. It offers structured methods, such as querying with SQL, to extract specific data as needed. Applications rely on the database system to access and extract the required data for various operations. For instance, in a relational database, data extraction is performed using SQL queries that retrieve data based on specified criteria. This process is fundamental to operations like reporting, analytics, and data migration.
teradata.com
C. Operating System:
The operating system manages hardware resources and provides services for application execution but doesn't directly handle data extraction from applications. It ensures that applications have the necessary environment to run but delegates data management tasks to the database systems.
D. Networks:
Networks facilitate data transmission between systems but don't directly extract data from applications. They provide the pathways for data to travel between clients and servers or between different systems but aren't responsible for the extraction process within an application.
In summary, the database system is the component that provides the necessary tools and methods for data extraction within an application, making option B the correct answer.
Which of the following sites would an Internet service provider most likely use to restore operations after its servers were damaged by a natural disaster?
On site.
Cold site.
Hot site.
Warm site
A hot site is a fully operational, ready-to-use backup site that allows an organization to quickly resume business operations after a disaster. For an Internet Service Provider (ISP), maintaining continuous operations is critical, and a hot site ensures minimal downtime by providing pre-configured hardware, software, and network connectivity.
A. On-site – Keeping backups and disaster recovery infrastructure on-site is risky because it can be affected by the same disaster that damaged the primary servers.
B. Cold site – A cold site is a backup location that has infrastructure but lacks pre-installed systems and configurations. It takes significant time to become operational, making it unsuitable for an ISP needing quick recovery.
C. Hot site (Correct Answer) – A hot site is fully operational, with replicated data, applications, and network configurations that allow an ISP to quickly switch operations, minimizing service disruption.
D. Warm site – A warm site is partially equipped with some hardware and software but requires configuration before becoming operational. This delays recovery compared to a hot site.
IIA GTAG (Global Technology Audit Guide) 10 – Business Continuity Management emphasizes the importance of hot sites for organizations requiring real-time service restoration.
IIA IPPF Standard 2120 – Risk Management advises organizations to assess disaster recovery plans and ensure continuity strategies align with business needs.
COBIT 2019 – DSS04 (Managed Continuity) discusses different recovery site types and their impact on business continuity.
Explanation of Each Option:IIA References:
Which of the following statements distinguishes a router from a typical switch?
A router operates at layer two. while a switch operates at layer three of the open systems interconnection model.
A router transmits data through frames, while a switch sends data through packets.
A router connects networks, while a switch connects devices within a network.
A router uses a media access control address during the transmission of data, whie a switch uses an internet protocol address.
A router and a switch serve different functions in a network.
A router is responsible for connecting multiple networks together and directing data packets between them. It determines the best path for data to travel using IP addresses.
A switch, on the other hand, operates within a single network and connects devices like computers, printers, and servers. It uses MAC addresses to forward data within the local network (LAN).
A. A router operates at layer two, while a switch operates at layer three of the OSI model – Incorrect. A switch operates at Layer 2 (Data Link Layer), while a router operates at Layer 3 (Network Layer).
B. A router transmits data through frames, while a switch sends data through packets – Incorrect. Switches use frames at Layer 2, while routers use packets at Layer 3.
C. A router connects networks, while a switch connects devices within a network (Correct Answer) – This correctly differentiates their functions.
D. A router uses a media access control (MAC) address during the transmission of data, while a switch uses an internet protocol (IP) address – Incorrect. A switch uses MAC addresses, and a router uses IP addresses.
IIA GTAG 17 – Auditing IT Governance discusses network security and the role of routers and switches.
COBIT 2019 – DSS01 (Managed Operations) emphasizes secure and efficient network management.
NIST SP 800-53 – Security Controls for IT Systems includes guidelines on network architecture and device functionality.
Explanation of Each Option:IIA References:
An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?
Boundary attack.
Spear phishing attack.
Brute force attack.
Spoofing attack.
A spear phishing attack is a highly targeted email-based attack where an attacker impersonates a trusted individual (e.g., the CEO) to trick recipients into providing sensitive information.
In this scenario, an intruder posed as the CEO and deceived payroll staff into sharing employees' private tax information.
Spear phishing is more targeted than general phishing, often using personal details to make the fraudulent request seem legitimate.
A. Boundary attack. (Incorrect)
A boundary attack refers to attempts to breach an organization’s network perimeter defenses, such as firewalls and intrusion detection systems.
This scenario describes a social engineering attack, not a technical boundary attack.
B. Spear phishing attack. (Correct)
Spear phishing attacks are highly personalized email attacks, usually targeting specific employees within an organization.
Attackers research their targets and use realistic messages to trick them into divulging sensitive data.
This fits the scenario, as the attacker impersonated the CEO to steal tax information.
C. Brute force attack. (Incorrect)
A brute force attack involves systematically guessing passwords to gain unauthorized access to systems.
This attack was based on deception, not password cracking.
D. Spoofing attack. (Incorrect, but closely related)
Email spoofing is a technique where an attacker falsifies the sender’s email address.
While spear phishing often includes spoofing, the broader technique used here is spear phishing, as it involved social engineering and deception.
IIA GTAG 16 – Security Risk: IT and Cybersecurity discusses phishing and social engineering threats, emphasizing internal controls to mitigate them.
IIA Standard 2120 – Risk Management highlights the need for risk assessments in cybersecurity, including employee awareness training for phishing attacks.
National Institute of Standards and Technology (NIST) Special Publication 800-61 classifies spear phishing as a high-risk cyber threat to organizations.
Explanation of Answer Choices:IIA References:
Which of the following physical security controls is able to serve as both a detective and preventive control?
Authentication logs.
Card key readers.
Biometric devices
Video surveillance.
Which of the following best describes the type of control provided by a firewall?
Corrective
Detective
Preventive
Discretionary
A firewall is a security control mechanism designed to prevent unauthorized access to or from a private network. It monitors and filters incoming and outgoing network traffic based on predefined security rules.
Definition of Control Types:
Preventive Control: Stops an undesirable event from occurring.
Detective Control: Identifies and records events after they have happened.
Corrective Control: Takes action to correct an issue after it has been detected.
Discretionary Control: Provides access control based on user discretion.
Why a Firewall is a Preventive Control:
Firewalls block unauthorized access to protect networks before a security breach can occur.
They enforce security policies in real-time, preventing cyber threats such as malware, intrusions, and unauthorized data access.
As per IIA GTAG (Global Technology Audit Guide) on Information Security, firewalls are categorized as preventive controls because they proactively mitigate threats before they materialize.
Why Not Other Options?
A. Corrective: Firewalls do not correct security breaches; they prevent them.
B. Detective: Firewalls do not just detect threats but actively block them.
D. Discretionary: Firewalls operate based on preset security rules rather than user discretion.
IIA GTAG – Information Security
IIA Standard 2110 – IT Governance & Risk Management
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is C. Preventive.
When examining; an organization's strategic plan, an internal auditor should expect to find which of the following components?
Identification of achievable goals and timelines
Analysis of the competitive environment.
Plan for the procurement of resources
Plan for progress reporting and oversight.
A strategic plan outlines an organization’s long-term objectives, defining achievable goals and the timelines for reaching them. It serves as a roadmap for future success and ensures alignment with the organization's mission.
Let’s analyze each option:
Option A: Identification of achievable goals and timelines.
Correct.
A strategic plan must include clear, measurable objectives and timelines for achieving them.
Without defined goals and timelines, an organization lacks direction and accountability.
IIA Reference: Internal auditors assess strategic planning processes to ensure goals are well-defined, realistic, and aligned with business objectives. (IIA Practice Guide: Auditing Strategic Management)
Option B: Analysis of the competitive environment.
Incorrect.
While environmental analysis is an important input into strategic planning (e.g., through SWOT or PESTEL analysis), it is not a core component of the plan itself.
Option C: Plan for the procurement of resources.
Incorrect.
Resource procurement falls under operational or tactical planning, which is separate from high-level strategic planning.
Option D: Plan for progress reporting and oversight.
Incorrect.
While monitoring progress is important, it is part of strategy execution and performance measurement rather than the core strategic plan itself.
Thus, the verified answer is A. Identification of achievable goals and timelines.
How can the concept of relevant cost help management with behavioral analyses?
It explains the assumption mat both costs and revenues are linear through the relevant range
It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.
It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions
It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action
Relevant cost refers to costs that will change depending on a specific business decision. It is crucial for decision-making as it helps management assess the financial impact of alternatives.
Relevant costs focus on future costs that differ between decision alternatives.
They help management analyze how different choices impact profitability.
This supports decision-making in areas such as pricing, outsourcing, and product discontinuation.
A. It explains the assumption that both costs and revenues are linear through the relevant range → Incorrect. While linear cost behavior is often assumed, it is not the primary purpose of relevant cost analysis.
B. It enables management to calculate a minimum number of units to produce and sell without having to incur a loss → Incorrect. This describes break-even analysis, not relevant cost analysis.
C. It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions → Incorrect. Depreciation is a sunk cost and is not considered relevant for decision-making.
The IIA’s Practice Guide: Financial Decision-Making and Internal Audit’s Role outlines how relevant cost analysis aids business strategy.
International Professional Practices Framework (IPPF) Standard 2120 states that internal auditors should assess management’s cost-analysis techniques.
Managerial Accounting Concepts (by IMA and COSO) emphasize relevant costs in strategic decision-making.
Why Option D is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is D. It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action.
Focus An organization has decided to have all employees work from home. Which of the following network types would securely enable this approach?
A wireless local area network (WLAN ).
A personal area network (PAN).
A wide area network (WAN).
A virtual private network (VPN)
When employees work from home, secure remote access to the organization's network is essential to protect data and ensure confidentiality. A Virtual Private Network (VPN) is the best option for enabling this securely.
Correct Answer (D - A Virtual Private Network (VPN))
A VPN creates a secure, encrypted connection between the employee's device and the organization’s internal network.
It prevents unauthorized access by ensuring that data is transmitted securely over the internet.
The IIA GTAG 17: Auditing Network Security recommends VPNs for secure remote work environments to prevent cyber threats.
Why Other Options Are Incorrect:
Option A (A Wireless Local Area Network - WLAN):
A WLAN is used within an office or home environment, but it does not provide secure remote access to an organization's network.
Option B (A Personal Area Network - PAN):
A PAN connects devices like smartphones and laptops within a short range (e.g., Bluetooth), but it is not suitable for secure remote access.
Option C (A Wide Area Network - WAN):
A WAN connects multiple locations, but it does not provide encryption or remote security like a VPN.
IIA GTAG 17: Auditing Network Security – Recommends VPNs for secure remote access.
IIA Practice Guide: Auditing IT Security Controls – Covers VPNs as a key security control for remote work.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because a VPN ensures secure, encrypted communication for employees working from home.
Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?
Firewall.
Encryption.
Antivirus.
Biometrics.
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules. It is the primary control for preventing unauthorized external access to an organization's network, making it the best answer.
A. Firewall (Correct Answer) – Firewalls prevent unauthorized access by filtering traffic, blocking malicious connections, and securing the network perimeter.
B. Encryption – While encryption protects data confidentiality, it does not actively prevent unauthorized access to a network.
C. Antivirus – Antivirus software protects against malware and viruses but does not prevent unauthorized network access.
D. Biometrics – Biometrics controls physical or logical access (e.g., fingerprint authentication) but does not secure a network from external threats.
IIA GTAG 15 – Information Security Governance highlights firewalls as a critical security control for network protection.
IIA IPPF Standard 2110 – Governance emphasizes the need for network security policies that include firewalls.
NIST SP 800-41 Rev. 1 – Guidelines on Firewalls and Firewall Policy states that firewalls are the first line of defense in securing organizational networks.
Explanation of Each Option:IIA References:
Following an evaluation of an organization's IT controls, an internal auditor suggested improving the process where results are compared against the input. Which of the following IT controls would the Internal auditor recommend?
Output controls.
Input controls
Processing controls.
Integrity controls.
The question refers to an internal auditor evaluating IT controls and suggesting an improvement in the process where results are compared against the input. This indicates a focus on verifying the accuracy, completeness, and validity of processed data, which falls under processing controls.
Definition of IT Controls Categories:
Input Controls: Ensure data accuracy before processing but do not compare input to results.
Processing Controls: Ensure that data is processed correctly and that the output matches the expected results.
Output Controls: Verify the accuracy of the final output but do not directly compare results against input.
Integrity Controls: Ensure data integrity across systems but do not specifically focus on input-output validation.
Why Processing Controls?
Processing controls are designed to detect and correct errors during data processing.
According to the IIA’s Global Technology Audit Guide (GTAG) on Information Technology Risks, processing controls ensure data consistency, accuracy, and completeness by validating input data against expected output.
Examples of processing controls include:
Reconciliation controls (comparing input and output).
Validation and verification checks (ensuring correct processing logic).
Why Not Other Options?
A. Output Controls: Focus on final reports and user access, not comparing input with output.
B. Input Controls: Ensure valid data entry but do not verify processing results.
D. Integrity Controls: Protect data consistency but do not specifically involve input-output reconciliation.
IIA GTAG – Information Technology Risks and Controls
IIA Standard 2110 – IT Governance and Risk Management
COBIT 2019 – Control Objectives for Information and Related Technologies
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is C. Processing controls.
Which of the following business practices promotes a culture of high performance?
Reiterating the importance of compliance with established policies and procedures.
Celebrating employees' individual excellence.
Periodically rotating operational managers.
Avoiding status differences among employees.
A high-performance culture is one where employees are motivated to achieve excellence, innovate, and contribute to organizational success. This requires recognition of individual contributions, team collaboration, and strong leadership.
Let's analyze each option:
A. Reiterating the importance of compliance with established policies and procedures.
Incorrect. While compliance is crucial for governance and risk management, simply enforcing policies does not inherently promote high performance. High-performance cultures go beyond compliance to encourage innovation, creativity, and ownership.
B. Celebrating employees' individual excellence. ✅ (Correct Answer)
Correct. Recognizing and rewarding employees for their achievements, innovation, and outstanding performance fosters motivation, engagement, and a culture of continuous improvement.
Examples include employee recognition programs, awards, and performance-based incentives.
C. Periodically rotating operational managers.
Incorrect. While job rotation can provide exposure to different roles, frequent changes in leadership may disrupt continuity and stability, potentially harming long-term performance.
D. Avoiding status differences among employees.
Incorrect. While reducing hierarchical barriers can improve collaboration, completely eliminating status differences is unrealistic. A well-structured leadership framework helps set clear roles, expectations, and accountability.
IIA Standard 2110 – Governance – Encourages fostering a performance-driven culture.
COSO ERM Framework – Performance & Strategy Alignment – Discusses the role of motivation and recognition in achieving organizational goals.
ISO 30414 – Human Capital Reporting – Covers employee engagement and performance culture.
IIA Practice Guide – Evaluating Corporate Culture – Highlights employee recognition as a key factor in high-performance environments.
IIA References:
The management of working capital is most crucial for which of the following aspects of business?
Liquidity
Profitability
Solvency
Efficiency
Working capital management focuses on short-term assets and liabilities to ensure a business has enough cash and liquid assets to meet its short-term obligations. Effective management of working capital directly impacts liquidity, allowing an organization to maintain operational stability.
Let’s analyze each option:
Option A: Liquidity.
Correct.
Liquidity refers to an organization’s ability to meet its short-term obligations, such as payroll, supplier payments, and operational expenses.
Working capital management ensures sufficient cash flow and current assets to cover immediate liabilities, making liquidity the primary concern.
IIA Reference: Internal auditors assess financial risk by evaluating liquidity management and cash flow strategies. (IIA Practice Guide: Auditing Liquidity Risk Management)
Option B: Profitability.
Incorrect.
While working capital impacts profitability (e.g., through cost control and investment decisions), profitability is more related to revenue and cost management, not just liquidity.
Option C: Solvency.
Incorrect.
Solvency refers to a company's long-term financial stability and its ability to meet debts over time.
Working capital is a short-term financial measure and does not directly determine solvency.
Option D: Efficiency.
Incorrect.
Efficiency relates to resource utilization and operational effectiveness, which are indirectly affected by working capital management but are not its primary focus.
Thus, the verified answer is A. Liquidity.
The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?
Commissions.
Stock options
Gain-sharing bonuses.
Allowances
The best method of compensation to align senior management incentives with the long-term health of the organization is stock options. Stock options encourage executives to focus on sustained growth and profitability rather than short-term gains, ensuring that their interests align with those of shareholders and stakeholders.
Long-Term Value Creation:
Stock options reward executives only if the company’s stock price appreciates over time.
This encourages leadership to focus on long-term profitability, operational efficiency, and sustainability.
Alignment with Shareholder Interests:
If the company performs well, stock prices rise, benefiting both shareholders and executives.
Poor decision-making that harms long-term value results in devalued stock options, discouraging risky short-term strategies.
Retention of Key Executives:
Stock options typically have a vesting period (e.g., 3-5 years), which helps retain top management and ensures commitment to long-term objectives.
Risk Management Considerations:
Unlike cash bonuses or short-term commissions, stock options require executives to consider risks and ethical decision-making over an extended period.
This supports the governance principles outlined by IIA’s International Standards for the Professional Practice of Internal Auditing (IPPF) – Standard 2110 (Governance), which emphasizes aligning incentives with risk tolerance and long-term objectives.
A. Commissions: These are typically tied to short-term sales performance rather than long-term strategic success.
C. Gain-sharing bonuses: These provide short-term financial rewards based on operational performance but do not incentivize sustained value creation.
D. Allowances: Fixed allowances do not fluctuate based on company performance and do not drive long-term strategic focus.
IIA Standard 2110 – Governance: Ensures that management incentives align with the organization's mission and risk tolerance.
IIA Practice Guide: Evaluating Corporate Governance: Emphasizes long-term incentive structures such as stock options to promote sustainable decision-making.
COSO Enterprise Risk Management (ERM) Framework: Highlights how executive compensation should support long-term organizational strategy.
Step-by-Step Justification:Why Not the Other Options?IIA References:
Copyright © 2014-2025 Certensure. All Rights Reserved