Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
Nondisclosure agreements between the firm and its employees.
Logs of user activity within the information system.
Two-factor authentication for access into the information system.
limited access so information, based on employee duties
The most effective way to prevent the unauthorized disclosure of confidential information is to limit access based on employee roles and duties. This follows the principle of least privilege (PoLP), ensuring that employees only access the data necessary for their job functions.
(A) Nondisclosure agreements between the firm and its employees. ❌
Incorrect. While NDAs help deter leaks, they do not prevent unauthorized access to information. An employee who signs an NDA can still access and leak data.
(B) Logs of user activity within the information system. ❌
Incorrect. Activity logs help detect and investigate breaches but do not actively prevent unauthorized disclosure.
(C) Two-factor authentication for access into the information system. ❌
Incorrect. While two-factor authentication enhances system security, it does not prevent employees with authorized access from leaking confidential data.
(D) Limited access to information, based on employee duties. ✅
Correct. Role-based access control (RBAC) ensures that employees only access the information necessary for their job responsibilities, reducing the risk of leaks.
IIA GTAG "Identity and Access Management" highlights restricted access as the most effective control for preventing unauthorized disclosure of confidential data.
IIA GTAG – "Identity and Access Management"
IIA Standard 2120 – Risk Management (Data Protection Controls)
COBIT Framework – Information Security and Access Control
Analysis of Answer Choices:IIA References:Thus, the correct answer is D (Limited access to information, based on employee duties), as restricting access is the most effective preventive control against data disclosure.
A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Compare to the annual cost of capital
Compare to the annual interest data.
Compare to the required rate of return.
Compare to the net present value.
The internal rate of return (IRR) is a measure used to evaluate the profitability of an investment. The project is considered acceptable if its IRR is greater than or equal to the required rate of return (RRR), which is the minimum return an organization expects from an investment.
Correct Answer (C - Compare to the Required Rate of Return)
The required rate of return (RRR) represents the minimum acceptable return for the project.
If IRR ≥ RRR, the project is acceptable. If IRR < RRR, the project is rejected.
The IIA Practice Guide: Auditing Capital Investments suggests comparing IRR to the RRR to ensure financial feasibility.
Why Other Options Are Incorrect:
Option A (Compare to the annual cost of capital):
The cost of capital (WACC - Weighted Average Cost of Capital) is an important factor, but RRR is the direct benchmark for IRR comparison.
Option B (Compare to the annual interest rate):
Interest rates do not determine project feasibility—they only affect financing costs.
Option D (Compare to the net present value - NPV):
NPV and IRR are related, but they serve different purposes.
IRR is compared against RRR, while NPV measures absolute profitability in dollar terms.
IIA Practice Guide: Auditing Capital Investments – Discusses IRR, RRR, and investment decision-making.
IIA GTAG 3: Business Case Development – Explains how financial metrics like IRR and RRR are used in decision-making.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because IRR should be compared to the required rate of return to determine project acceptability.
Which of the following statements is true regarding the management-by-objectives method?
Management by objectives is most helpful in organizations that have rapid changes.
Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.
Management by objectives helps organizations to keep employees motivated.
Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.
Understanding Management by Objectives (MBO):
MBO is a performance management approach where employees and managers set specific, measurable goals together.
The main purpose of MBO is to align individual objectives with organizational goals, enhancing motivation and engagement.
Why Option C (Helps Keep Employees Motivated) Is Correct?
Employee motivation improves when individuals understand how their efforts contribute to the organization’s success.
Setting clear objectives and allowing employees to participate in goal-setting increases job satisfaction and engagement.
IIA Standard 2120 – Risk Management supports frameworks like MBO that contribute to organizational performance and employee effectiveness.
Why Other Options Are Incorrect?
Option A (Most helpful in organizations with rapid changes):
MBO is less effective in rapidly changing environments because it relies on long-term goal setting.
Option B (Best in mechanistic organizations with rigid tasks):
MBO works better in adaptive, flexible organizations, not those with rigid structures.
Option D (Distinguishes strategic from operational goals):
MBO focuses on individual and team goals, not distinguishing strategic vs. operational goals.
MBO enhances employee motivation by involving them in goal-setting and performance tracking.
IIA Standard 2120 supports employee engagement strategies for better performance management.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management (Employee Engagement & Performance Management)
COSO ERM – Performance Measurement & Goal Alignment
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
26 days.
90 days,
100 days.
110 days
Understanding the Cash Conversion Cycle (CCC):
The Cash Conversion Cycle (CCC) measures the time taken for a company to convert raw materials into cash flow.
CCC is calculated using the formula: CCC=DaysInventoryOutstanding(DIO)+DaysSalesOutstanding(DSO)−DaysPayableOutstanding(DPO)CCC = Days Inventory Outstanding (DIO) + Days Sales Outstanding (DSO) - Days Payable Outstanding (DPO)CCC=DaysInventoryOutstanding(DIO)+DaysSalesOutstanding(DSO)−DaysPayableOutstanding(DPO)
Where:
DIO (Days Inventory Outstanding) = 55 days (time to convert raw materials to finished products).
DSO (Days Sales Outstanding) = 42 days (time to collect receivables).
DPO (Days Payable Outstanding) = 10 days (time to pay for raw materials).
Applying the Formula:
CCC=55+42−10CCC = 55 + 42 - 10CCC=55+42−10 CCC=100 daysCCC = 100 \text{ days}CCC=100 days
Why Option C (100 Days) Is Correct?
The CCC represents the time the company’s cash is tied up in production and sales before receiving payment.
This calculation aligns with IIA Standard 2120 – Risk Management, which requires auditors to assess financial liquidity and operational efficiency.
Why Other Options Are Incorrect?
Option A (26 days): Incorrect calculation.
Option B (90 days): Does not subtract DPO correctly.
Option D (110 days): Incorrect addition of all components instead of following the CCC formula.
The correct cash conversion cycle is 100 days, calculated using standard CCC methodology.
IIA Standard 2120 and financial management principles confirm the correct calculation.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management (Financial Performance & Liquidity Risk)
COSO ERM – Working Capital & Cash Flow Management
Financial Management Best Practices – Cash Conversion Cycle Analysis
Which of the following statements. Is most accurate concerning the management and audit of a web server?
The file transfer protocol (FTP) should always be enabled.
The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.
The number of ports and protocols allowed to access the web server should be maximized.
Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.
Importance of Secure Protocols for Web Server Management:
Web servers handle sensitive data, including user credentials, financial information, and confidential communications.
Using secure protocols like HTTPS, SFTP, and TLS-encrypted SMTP ensures data is encrypted and protected from cyber threats.
Risks of Clear-Text Protocols (HTTP & FTP):
HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) transmit data in plaintext, making them vulnerable to man-in-the-middle (MITM) attacks, packet sniffing, and unauthorized access.
SFTP (Secure File Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) encrypt data, mitigating these risks.
Why Other Options Are Incorrect:
A. The file transfer protocol (FTP) should always be enabled – Incorrect.
FTP is not secure, and enabling it can expose the server to unauthorized file access and cyberattacks.
B. The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts – Incorrect.
SMTP should operate with minimal privileges to reduce security risks in case of a breach.
C. The number of ports and protocols allowed to access the web server should be maximized – Incorrect.
Minimizing open ports and protocols reduces the attack surface and limits unauthorized access.
IIA’s Perspective on IT Security and Web Server Management:
IIA Standard 2110 – Governance requires organizations to establish secure IT practices, including encryption and secure protocols.
IIA GTAG (Global Technology Audit Guide) on IT Risks emphasizes minimizing security vulnerabilities by using encrypted communication.
ISO 27001 Security Standard recommends secure transmission protocols for protecting sensitive data.
IIA References:
IIA Standard 2110 – IT Security and Governance
IIA GTAG – IT Risks and Secure Web Server Management
ISO 27001 Security Standard – Data Encryption and Secure Transmission
Thus, the correct and verified answer is D. Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP.
Which of the following responsibilities would ordinary fall under the help desk function of an organization?
Maintenance service items such as production support.
Management of infrastructure services, including network management.
Physical hosting of mainframes and distributed servers
End-to -end security architecture design.
A help desk function is responsible for providing technical support and maintenance services to end users. This includes troubleshooting issues, production support, and system maintenance rather than managing infrastructure or security architecture.
Let’s analyze each option:
Option A: Maintenance service items such as production support.
Correct. The help desk primarily provides user support, including:
Troubleshooting software and hardware issues
Resolving technical support requests
Assisting users with system access and operational questions
IIA Reference: Internal auditors assess IT service management, including help desk functions, to ensure efficient IT support and incident response. (IIA GTAG: Auditing IT Service Management)
Option B: Management of infrastructure services, including network management.
Incorrect. Infrastructure services (such as network and server management) fall under IT operations or network administration, not the help desk.
Option C: Physical hosting of mainframes and distributed servers
Incorrect. Hosting and maintaining physical servers is the responsibility of data center operations, not the help desk.
Option D: End-to-end security architecture design.
Incorrect. Security architecture design is handled by the IT security team or cybersecurity department, not the help desk.
Thus, the verified answer is A. Maintenance service items such as production support.
During which phase of the contracting process ere contracts drafted for a proposed business activity?
Initiation phase.
Bidding phase
Development phase
Management phase
Understanding the Contracting Process PhasesThe contracting process generally follows these phases:
Initiation Phase: Identifies the need for a contract and sets initial objectives.
Bidding Phase: Potential vendors or partners submit proposals, and negotiations begin.
Development Phase: Contracts are drafted, negotiated, and finalized before execution.
Management Phase: The contract is executed, monitored, and evaluated for compliance.
Why Option C is Correct?
The development phase is where contracts are formally drafted based on agreements made during bidding and negotiation.
This phase includes legal review, compliance verification, and risk assessment, ensuring the contract aligns with business objectives and legal requirements.
IIA Standard 2110 – Governance requires auditors to assess how contract risks are managed, ensuring formal contract development processes.
Why Other Options Are Incorrect?
Option A (Initiation phase):
This phase defines the business need but does not involve drafting contracts.
Option B (Bidding phase):
In this phase, businesses solicit proposals, but contracts are not fully drafted until vendor selection.
Option D (Management phase):
The management phase involves executing and monitoring the contract, not drafting it.
Contracts are drafted during the development phase after vendor selection and before execution.
IIA Standard 2110 supports governance over contract risk and formal agreement processes.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Contract Risk & Compliance)
COSO ERM – Risk Management in Contracting
According to Maslow's hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
Esteem by colleagues.
Self-fulfillment
Series of belonging in the organization
Job security
Understanding Maslow’s Hierarchy of Needs
Maslow’s theory categorizes human needs into five levels:
Physiological Needs (Basic survival: food, water, shelter)
Safety Needs (Job security, stability, financial security)
Social Needs (Belonging, relationships, team interactions)
Esteem Needs (Recognition, achievement, respect)
Self-Actualization (Self-Fulfillment) – Reaching one’s full potential, professional growth, and personal development
Why Option B is Correct?
Offering an assignment for professional growth and advancement supports self-actualization (self-fulfillment).
This aligns with Maslow’s highest level, where individuals seek to maximize their potential and achieve personal excellence.
IIA Standard 1100 – Independence and Objectivity emphasizes the importance of professional growth in auditing and management roles.
Why Other Options Are Incorrect?
Option A (Esteem by colleagues):
Professional growth may increase esteem, but the focus here is on self-fulfillment, not external recognition.
Option C (Sense of belonging in the organization):
Belonging is a lower-level need (social level), while professional growth aligns with self-actualization.
Option D (Job security):
Job security falls under safety needs, which is a lower-tier concern.
Professional development aligns with self-actualization, the highest level in Maslow’s hierarchy, which focuses on maximizing potential.
IIA Standard 1100 supports professional growth as part of career advancement in internal auditing.
Final Justification:IIA References:
Maslow’s Hierarchy of Needs (Self-Actualization Level)
IPPF Standard 1100 – Independence and Objectivity
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
Tampering
Hacking
Phishing
Piracy
Hacking refers to unauthorized access to an IT system, typically with the intent to disrupt, steal, or manipulate data. In this scenario, activists attacking an oil company's IT system as a protest falls under hacking because they are illegally breaking into the company’s digital infrastructure to make a statement.
Let’s analyze each option:
Option A: Tampering
Incorrect. Tampering refers to physically altering or interfering with a system (e.g., changing sensor readings in an oil rig), rather than attacking an IT system digitally.
Option B: Hacking
Correct.
The individuals are gaining unauthorized access to the company’s IT system.
This action is commonly associated with hacktivism, where hackers attack organizations for political or ideological reasons.
IIA Reference: Internal auditors assess cybersecurity threats, including hacking and unauthorized access risks. (IIA GTAG: Auditing Cybersecurity Risks)
Option C: Phishing
Incorrect. Phishing involves tricking individuals into revealing sensitive information (e.g., login credentials) through fraudulent emails or websites, but this scenario describes a direct attack on the IT system.
Option D: Piracy
Incorrect. Piracy typically refers to copyright infringement (e.g., unauthorized software use) rather than hacking an IT system.
Thus, the verified answer is B. Hacking.
An Internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
The auditor is normalizing data in preparation for analyzing it.
The auditor is analyzing the data in preparation for communicating the results,
The auditor is cleaning the data in preparation for determining which processes may be involves .
The auditor is reviewing trio data prior to defining the question
In data analytics, cleaning the data is a crucial step where the auditor eliminates redundancies, corrects inconsistencies, and removes errors to ensure accurate analysis. This step is taken before analyzing the data to identify high-risk areas and relevant processes.
Correct Answer (C - Cleaning the Data in Preparation for Determining Involved Processes)
Data cleaning involves:
Removing duplicate entries to prevent misinterpretation.
Standardizing data formats for consistency.
Handling missing or inaccurate values to ensure reliability.
This step prepares the data for analysis and identification of high-risk processes.
The IIA’s GTAG 16: Data Analysis Technologies emphasizes data cleaning as a critical part of internal audit analytics.
Why Other Options Are Incorrect:
Option A (Normalizing data in preparation for analyzing it):
Normalization refers to structuring data efficiently (e.g., in databases) but does not necessarily involve eliminating redundancies in the way described.
Option B (Analyzing data in preparation for communicating results):
The auditor is still in the data preparation phase, not the analysis or reporting phase.
Option D (Reviewing data prior to defining the question):
The auditor is already working with data. Defining questions typically happens before data collection.
GTAG 16: Data Analysis Technologies – Covers data preparation, cleaning, and analytics in internal auditing.
IIA Practice Guide: Data Analytics in Internal Auditing – Outlines best practices for data validation and cleaning.
Step-by-Step Explanation:IIA References for Validation:Thus, cleaning the data (C) is the correct answer, as it ensures data integrity before identifying relevant processes and risks.
According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?
Project portfolio.
Project development
Project governance.
Project management methodologies
Project governance refers to a broad collection of integrated policies, standards, and procedures that provide a framework for planning and executing projects. It establishes decision-making processes, accountability, and risk management controls to ensure that projects align with organizational objectives.
(A) Project portfolio. ❌
Incorrect. A project portfolio refers to a collection of projects managed together to achieve strategic objectives. It does not specifically define the policies, standards, and procedures for project execution.
(B) Project development. ❌
Incorrect. Project development focuses on designing, building, and testing a project, but it does not encompass governance structures like policies, standards, and oversight.
(C) Project governance. ✅
Correct. Project governance includes integrated policies, standards, and procedures that guide project planning, execution, and oversight.
IIA GTAG "Auditing IT Projects" emphasizes project governance as the primary control framework for managing project risks and ensuring alignment with organizational goals.
(D) Project management methodologies. ❌
Incorrect. Project management methodologies (e.g., Agile, Waterfall, PRINCE2) provide structured approaches for executing projects but do not encompass the full governance framework.
IIA GTAG – "Auditing IT Projects"
IIA Standard 2110 – Governance (Project Risk Management)
COSO ERM Framework – Project Oversight and Risk Governance
Analysis of Answer Choices:IIA References:Thus, the correct answer is C (Project governance), as it provides the integrated policies, standards, and procedures needed for effective project oversight.
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Direct, product costs.
Indirect product costs.
Direct period costs,
Indirect period costs
Absorption costing is a costing method that allocates all manufacturing costs (both variable and fixed) to the cost of a product. In this method, fixed manufacturing overhead costs are treated as indirect product costs because they are not directly traceable to a single unit of production but are still part of the total cost of producing goods.
Let’s analyze each option:
Option A: Direct, product costs.
Incorrect. Direct costs are costs that can be traced directly to a specific product, such as direct materials and direct labor. Fixed manufacturing overhead is not a direct cost because it is spread across all units produced.
Option B: Indirect product costs.
Correct. Fixed manufacturing overhead costs (such as rent, depreciation, and utilities for the production facility) are indirect costs because they support the entire production process rather than a specific product. However, under absorption costing, they are still treated as product costs and allocated to inventory.
IIA Reference: The IIA’s guidance on cost allocation states that absorption costing assigns all manufacturing costs (including fixed overhead) to products. (IIA Practice Guide: Cost and Profitability Analysis)
Option C: Direct period costs.
Incorrect. Period costs are expensed in the period they occur, while absorption costing treats fixed manufacturing overhead as part of inventory (product cost) until sold.
Option D: Indirect period costs.
Incorrect. Fixed manufacturing overhead is not expensed immediately as a period cost under absorption costing; it is capitalized into inventory and expensed as Cost of Goods Sold (COGS) when the product is sold.
Thus, the verified answer is B. Indirect product costs.
Which of the following statements is true regarding data backup?
System backups should always be performed real time.
Backups should be stored in a secured location onsite for easy access.
The tape rotation schedule affects how long data is retained
Backup media should be restored only m case of a hardware or software failure
A tape rotation schedule defines how often backup tapes are overwritten or archived, directly impacting data retention periods. This is essential for compliance, disaster recovery, and internal controls over data storage.
Correct Answer (C - The Tape Rotation Schedule Affects How Long Data is Retained)
Organizations use backup rotation schemes such as Grandfather-Father-Son (GFS), Tower of Hanoi, or FIFO (First-In-First-Out) to determine how long backups are kept before being overwritten.
This impacts data retention policies, regulatory compliance, and recovery capabilities.
The IIA’s GTAG 10: Business Continuity Management discusses backup strategies and retention management.
Why Other Options Are Incorrect:
Option A (System backups should always be performed real-time):
Real-time backups (continuous data protection) are useful but not always required. Many businesses use scheduled backups instead.
Option B (Backups should be stored in a secured location onsite for easy access):
Best practice recommends offsite or cloud storage to protect against disasters like fire or cyberattacks.
Option D (Backup media should be restored only in case of hardware or software failure):
Backups may also be restored for audit purposes, compliance checks, or business continuity testing.
GTAG 10: Business Continuity Management – Covers backup strategies, data retention, and disaster recovery.
IIA Practice Guide: IT Controls – Discusses backup policies and risks in data management.
Step-by-Step Explanation:IIA References for Validation:Thus, the tape rotation schedule (C) is correct because it determines how long data is retained.
Which of the following job design techniques would most likely be used to increase employee motivation through job responsibility and recognition?
Job complicating
Job rotation
Job enrichment
Job enlargement
Understanding Job Enrichment:
Job enrichment is a job design technique that increases motivation by adding meaningful responsibilities, autonomy, and recognition to a job.
It aligns with Herzberg’s Two-Factor Theory, which suggests that responsibility and recognition are key motivators.
How Job Enrichment Increases Employee Motivation:
Increases Autonomy: Employees are given more decision-making power, leading to a stronger sense of ownership.
Provides Recognition: Workers receive direct feedback and acknowledgment for their contributions.
Encourages Skill Development: Employees handle more complex tasks, improving job satisfaction and career growth opportunities.
Why Other Options Are Incorrect:
A. Job complicating – Incorrect, as this is not a recognized job design technique; increasing job difficulty does not improve motivation.
B. Job rotation – Incorrect, as job rotation involves shifting employees between different tasks to reduce monotony, but it does not necessarily increase job responsibility or recognition.
D. Job enlargement – Incorrect, as job enlargement adds more tasks at the same skill level, increasing workload without necessarily improving responsibility or recognition.
IIA’s Perspective on Employee Motivation and Organizational Success:
IIA Standard 2120 – Risk Management states that internal auditors should evaluate employee engagement strategies, including job design techniques.
COSO ERM Framework emphasizes that motivated employees contribute to operational efficiency and organizational success.
IIA References:
IIA Standard 2120 – Risk Management & Employee Motivation
Herzberg’s Two-Factor Theory – Motivation through Responsibility and Recognition
COSO ERM – Employee Engagement and Organizational Performance
Thus, the correct and verified answer is C. Job enrichment.
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?
A warm recovery plan.
A cold recovery plan.
A hot recovery plan.
A manual work processes plan
A disaster recovery plan (DRP) ensures that an organization can restore operations after a major IT system failure. The level of readiness depends on the type of recovery site used:
Correct Answer (A - A Warm Recovery Plan)
A warm site is a partially configured recovery site with some hardware and network infrastructure in place.
In the event of a disaster, some configuration and data restoration are required before full operation can resume.
This solution balances cost and recovery speed, making it ideal for moderate-risk scenarios.
The IIA GTAG 10: Business Continuity Management discusses warm sites as an effective disaster recovery solution.
Why Other Options Are Incorrect:
Option B (A Cold Recovery Plan):
A cold site has minimal infrastructure and requires significant time for setup and data restoration.
This is not ideal for organizations needing faster recovery.
Option C (A Hot Recovery Plan):
A hot site is a fully operational backup system that allows instant recovery, but it is very costly.
The scenario mentions "some configuration and data restoration", which suggests a warm site, not a hot site.
Option D (A Manual Work Processes Plan):
A manual plan involves non-IT solutions, which would not address IT system restoration.
IIA GTAG 10: Business Continuity Management – Describes warm, cold, and hot sites for disaster recovery.
IIA Practice Guide: Auditing Business Continuity Plans – Recommends warm recovery sites for balancing cost and recovery time.
Step-by-Step Explanation:IIA References for Validation:Thus, A is the correct answer because a warm recovery plan allows partial system readiness with minimal downtime.
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Cost of sales and net income are understated.
Cost of sales and net income are overstated.
Cost of sales is understated and not income is overstated.
Cost of sales is overstated and net Income is understated.
When inventory is understated (not included in the physical count) at year-end, the financial impact affects both cost of sales (COGS) and net income as follows:
Correct Answer (C - Cost of Sales is Understated and Net Income is Overstated)
The ending inventory is part of the formula used to calculate the cost of goods sold (COGS): COGS=BeginningInventory+Purchases−EndingInventoryCOGS = Beginning Inventory + Purchases - Ending InventoryCOGS=BeginningInventory+Purchases−EndingInventory
If ending inventory is understated, then:
COGS will be understated (because inventory that should have been counted as sold was omitted).
Net income will be overstated because COGS is lower than it should be, making profits appear higher.
This error causes financial misstatements, violating IIA auditing standards for financial accuracy.
Why Other Options Are Incorrect:
Option A (Cost of sales and net income are understated):
Net income would not be understated—it would be overstated because the cost of goods sold is too low.
Option B (Cost of sales and net income are overstated):
COGS would be understated, not overstated. If COGS were overstated, net income would be understated.
Option D (Cost of sales is overstated and net income is understated):
The opposite happens—COGS is understated and net income is overstated.
IIA GTAG 8: Audit of Inventory Management – Covers financial impact of inventory misstatements.
IIA Practice Guide: Auditing Financial Statements – Addresses common inventory errors and financial reporting impacts.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because an understated inventory reduces COGS and inflates net income.
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?
Data is synchronized in real time
Recovery time is expected to be less than one week
Servers are not available and need to be procured
Recovery resources end data restore processes have not been defined.
A cold site is a disaster recovery option that provides only basic infrastructure (such as power, space, and network connectivity) but does not have pre-installed IT equipment such as servers and storage. Organizations must procure and install servers and restore data before resuming operations, leading to longer recovery times.
Let’s analyze each option:
Option A: Data is synchronized in real-time
Incorrect.
Real-time data synchronization is a feature of hot sites, which have fully operational infrastructure and data replication.
Cold sites do not support real-time synchronization because they lack servers and storage.
Option B: Recovery time is expected to be less than one week
Incorrect.
Cold sites require significant setup time since servers and infrastructure must be procured, configured, and installed.
Recovery time can often exceed one week, depending on the complexity of IT systems.
Option C: Servers are not available and need to be procured
Correct.
A cold site lacks computing hardware (e.g., servers, storage, network devices), meaning the organization must purchase or transport servers to the site before recovery can begin.
IIA Reference: Internal auditors assess disaster recovery strategies, including the limitations of cold sites and their impact on business continuity. (IIA GTAG: Auditing Business Continuity and Disaster Recovery)
Option D: Recovery resources and data restore processes have not been defined.
Incorrect.
Even though a cold site lacks IT infrastructure, the organization still has a disaster recovery plan, which includes predefined recovery steps, resource planning, and data restoration procedures.
Thus, the verified answer is C. Servers are not available and need to be procured.
For employees, the primary value of implementing job enrichment is which of the following?
Validation of the achievement of their goals anti objectives
Increased knowledge through the performance of additional tasks
Support for personal growth and a meaningful work experience
An increased opportunity to manage better the work done by their subordinates
Job enrichment is a motivational strategy where employees are given more control, responsibility, and meaningful tasks in their roles. It aims to increase job satisfaction, personal growth, and motivation by making work more engaging and fulfilling.
Let’s analyze each option:
Option A: Validation of the achievement of their goals and objectives
Incorrect.
While job enrichment may contribute to achieving personal and professional goals, its primary purpose is not just validation but improving employee engagement and motivation.
Option B: Increased knowledge through the performance of additional tasks
Incorrect.
Job enlargement (not job enrichment) involves assigning additional tasks without necessarily increasing responsibility or autonomy.
Job enrichment focuses on providing meaningful and challenging work, not just adding tasks.
Option C: Support for personal growth and a meaningful work experience
Correct.
Job enrichment enhances job satisfaction by giving employees greater autonomy, responsibility, and purpose in their roles.
It encourages personal and professional development, leading to a more meaningful work experience.
IIA Reference: Internal auditors assessing human resource and organizational performance management focus on employee motivation strategies, including job enrichment. (IIA Practice Guide: Talent Management and Human Capital Risks)
Option D: An increased opportunity to manage better the work done by their subordinates
Incorrect.
Job enrichment does not necessarily focus on managing subordinates but rather on enhancing individual job roles by making them more fulfilling.
Thus, the verified answer is C. Support for personal growth and a meaningful work experience.
An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?
The capital accounts of the partners should be increased by she original cost of the contributed equipment.
The capital accounts should be increased using a weighted average based by the current percentage of ownership.
No action is needed, as the capital account of each partner was increased by the correct amount,
The capital accounts of the partners should be increased by She fair market value of their contribution.
In an equal equity partnership, partners' capital accounts should reflect the fair market value (FMV) of assets contributed, rather than self-declared values or historical cost. The fair market value ensures equitable ownership distribution and accurate financial reporting.
Let’s analyze each option:
Option A: The capital accounts of the partners should be increased by the original cost of the contributed equipment.
Incorrect. The original cost (historical cost) of an asset is not relevant in partnership accounting. Instead, fair market value (FMV) is used to properly recognize each partner's contribution.
Option B: The capital accounts should be increased using a weighted average based on the current percentage of ownership.
Incorrect. While ownership percentages influence profit and loss distribution, initial capital contributions should be recorded at FMV, not a weighted average.
Option C: No action is needed, as the capital account of each partner was increased by the correct amount.
Incorrect. Since the partners contributed different self-declared values, the capital accounts may not be correctly recorded unless verified against FMV. The partnership agreement typically requires capital contributions to be valued based on FMV, not self-declared estimates.
Option D: The capital accounts of the partners should be increased by the fair market value of their contribution.
Correct. Fair market value (FMV) ensures that capital contributions are recorded accurately. Using self-declared values without verification can lead to misstatements in capital accounts and potential disputes.
IIA Reference: Internal auditors reviewing partnership accounting should ensure that capital accounts reflect fair market value to maintain financial accuracy. (IIA Practice Guide: Auditing Fair Value Estimates)
Thus, the verified answer is D. The capital accounts of the partners should be increased by the fair market value of their contribution.
Which of the following statements, is true regarding the capital budgeting procedure known as discounted payback period?
It calculates the overall value of a project.
It ignores the time value of money.
It calculates the time a project takes to break even.
It begins at time zero for the project.
The discounted payback period (DPP) is a capital budgeting technique that determines how long it takes for a project’s discounted cash flows to recover its initial investment. Unlike the regular payback period, the DPP accounts for the time value of money by discounting future cash flows.
(A) It calculates the overall value of a project.
Incorrect. The discounted payback period only measures how long it takes to recover the initial investment—it does not determine the overall value of a project. Net Present Value (NPV) and Internal Rate of Return (IRR) are used to evaluate a project's overall value.
(B) It ignores the time value of money.
Incorrect. Unlike the regular payback period, the discounted payback period accounts for the time value of money by discounting future cash flows using a required rate of return.
(C) It calculates the time a project takes to break even. ✅
Correct. The discounted payback period determines how long it takes for the present value of cash inflows to recover the initial investment. It helps assess the risk and liquidity of a project.
IIA GTAG "Auditing Capital Budgeting and Investment Decisions" states that discounted payback is useful for assessing the risk of projects by considering cash flow recovery time.
(D) It begins at time zero for the project.
Incorrect. The calculation starts at time zero (when the investment is made), but the method itself focuses on future discounted cash flows to determine the break-even point.
IIA GTAG – "Auditing Capital Budgeting and Investment Decisions"
COSO ERM Framework – Capital Investment Risk Management
GAAP/IFRS – Discounted Cash Flow Methods
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as the discounted payback period measures the time needed to break even after adjusting for the time value of money.
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters.
Orders, commands, and advice are sent to the subsidiaries from headquarters.
Poop o of local nationality are developed for the best positions within their own country.
There is a significant amount of collaboration between headquarters and subs diaries.
An ethnocentric attitude in global business means that the parent company (headquarters) makes all key decisions and expects its foreign subsidiaries to follow directives without much autonomy. This approach often results in centralized control, standardized policies, and minimal local input.
(A) Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters.
Incorrect. In an ethnocentric organization, standards and controls are determined by headquarters, not by local subsidiaries.
IIA Standard 2120 – Risk Management emphasizes that corporate governance should ensure consistent policies across all locations, which aligns with ethnocentric approaches.
(B) Orders, commands, and advice are sent to the subsidiaries from headquarters. ✅
Correct. In ethnocentric organizations, decision-making authority is centralized at headquarters, and subsidiaries are expected to follow orders and policies without deviation.
IIA GTAG "Auditing Global Operations" discusses risks related to centralized control structures, where headquarters enforces policies globally.
(C) People of local nationality are developed for the best positions within their own country.
Incorrect. This describes a polycentric approach, where local talent is developed for leadership roles. Ethnocentric organizations prefer to assign expatriates from headquarters to key positions in subsidiaries.
(D) There is a significant amount of collaboration between headquarters and subsidiaries.
Incorrect. Collaboration is more common in geocentric or regiocentric models, where decision-making is shared. Ethnocentric organizations have limited collaboration, as headquarters dictates policies.
IIA GTAG – "Auditing Global Operations"
IIA Standard 2120 – Risk Management
COSO Framework – Internal Control and Corporate Governance
Analysis of Answer Choices:IIA References:Thus, the correct answer is B, as ethnocentric organizations enforce top-down control, sending orders, commands, and advice to subsidiaries.
A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Lack of coordination among different business units
Operational decisions are inconsistent with organizational goals
Suboptimal decision making
Duplication of business activities
In a vertically centralized organization, decision-making authority is concentrated at the top levels of management. As a company rapidly expands, maintaining tight control by a small management team can lead to inefficiencies, delays, and suboptimal decision-making due to limited input from operational and frontline staff.
Let’s analyze each option:
Option A: Lack of coordination among different business units
Incorrect. While coordination challenges can exist in a large, decentralized organization, a tightly controlled, centralized structure typically ensures strong coordination but at the cost of slower decision-making.
Option B: Operational decisions are inconsistent with organizational goals
Incorrect. In a centralized structure, top management closely controls decision-making, making goal misalignment less likely.
Option C: Suboptimal decision making
Correct.
Decentralized decision-making allows managers closer to operations to make informed, timely decisions.
A small centralized team may lack specialized knowledge about different departments, leading to inefficient or outdated decisions.
As the company expands, delays in decision-making and lack of responsiveness to market conditions increase risk exposure.
IIA Reference: Internal auditors assess organizational structures to identify risks associated with inefficient decision-making and control bottlenecks. (IIA Standard 2110: Governance)
Option D: Duplication of business activities
Incorrect. Duplication of activities is more common in decentralized structures, where different departments operate independently. A tightly controlled, centralized structure reduces redundancy but at the cost of decision-making efficiency.
Thus, the verified answer is C. Suboptimal decision making.
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
Session hijacking.
Jailbreaking
Eavesdropping,
Authentication.
Understanding Copyright Issues and Smart Devices:
Copyright laws protect software, firmware, and intellectual property embedded in smart devices.
Jailbreaking refers to modifying a device’s software to remove manufacturer-imposed restrictions, often to install unauthorized third-party apps.
This violates software licensing agreements and may infringe on copyright protections under laws like the Digital Millennium Copyright Act (DMCA).
Why Option B (Jailbreaking) Is Correct?
Jailbreaking allows users to bypass manufacturer restrictions, potentially leading to unauthorized software distribution and copyright violations.
Manufacturers implement Digital Rights Management (DRM) to protect copyrighted firmware and software, which jailbreaking circumvents.
IIA Standard 2110 – Governance includes evaluating intellectual property risks and compliance in IT audits.
Why Other Options Are Incorrect?
Option A (Session hijacking):
This is a cybersecurity attack where a hacker takes control of a user session. It does not impact copyright laws.
Option C (Eavesdropping):
Eavesdropping refers to unauthorized network surveillance, which is a privacy issue, not a copyright issue.
Option D (Authentication):
Authentication is a security mechanism to verify user identity and has no direct relation to copyright concerns.
Jailbreaking bypasses copyright protections and violates software licensing agreements, making it the best answer.
IIA Standard 2110 emphasizes the importance of IT governance and compliance with intellectual property laws.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Intellectual Property & IT Compliance)
ISO 27001 – IT Security & Digital Rights Protection
Digital Millennium Copyright Act (DMCA) – Copyright Protection for Software
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
Fixed and Variable manufacturing costs are less than the special offer selling price.
The manufacturer can fulfill the order without expanding the capacities of the production facilities.
Costs related to accepting this offer can be absorbed through the sale of other products.
The manufacturer’s production facilities are currently operating at full capacity.
When evaluating a special order, the manufacturer must determine if accepting it will be profitable without disrupting normal operations. The key consideration is whether the company has spare production capacity to handle the order without increasing fixed costs.
Correct Answer (B - The Manufacturer Can Fulfill the Order Without Expanding Production Facilities)
Fixed costs ($3 per unit) are already incurred and will not change if the order is accepted.
The special price ($7 per unit) covers the variable costs ($5 per unit), contributing $2 per unit to profit.
If the manufacturer has excess production capacity, the order is profitable.
The IIA Practice Guide: Auditing Financial Performance emphasizes that special order decisions should be based on incremental cost analysis, ensuring no need for capacity expansion.
Why Other Options Are Incorrect:
Option A (Fixed and Variable Manufacturing Costs Are Less Than the Special Offer Selling Price):
Fixed costs should not be considered in short-term pricing decisions if they are already incurred.
Option C (Costs Related to Accepting This Offer Can Be Absorbed Through the Sale of Other Products):
The decision should be based on whether the order is profitable on its own, not relying on other products.
Option D (The Manufacturer’s Production Facilities Are Operating at Full Capacity):
If the company is at full capacity, accepting the order would require sacrificing existing sales or expanding capacity, which increases costs.
IIA Practice Guide: Auditing Financial Performance – Discusses cost analysis for special pricing decisions.
IIA GTAG 13: Business Performance – Covers incremental cost and profitability analysis in pricing decisions.
Step-by-Step Explanation:IIA References for Validation:Thus, B is the correct answer because accepting the order is only profitable if the manufacturer has excess capacity.
How do data analysis technologies affect internal audit testing?
They improve the effectiveness of spot check testing techniques.
They allow greater insight into high risk areas.
They reduce the overall scope of the audit engagement,
They increase the internal auditor's objectivity.
Understanding Data Analysis in Internal Auditing
Data analytics enhances audit testing by identifying patterns, anomalies, and high-risk transactions within large datasets.
Advanced analytics tools (e.g., AI, machine learning, continuous auditing) help auditors pinpoint areas of fraud, compliance violations, or operational inefficiencies.
Why Option B is Correct?
Data analysis improves risk assessment by allowing auditors to focus on high-risk areas, such as fraudulent transactions or control weaknesses.
IIA Standard 1220 – Due Professional Care requires auditors to use technology to improve audit effectiveness, including identifying risks.
IIA GTAG (Global Technology Audit Guide) 16 – Data Analytics supports using analytics to enhance risk-based auditing.
Why Other Options Are Incorrect?
Option A (Improves effectiveness of spot check testing techniques):
Data analysis enables continuous and full-population testing, rather than just improving spot checks.
Option C (Reduces the overall scope of the audit engagement):
Analytics refines audit focus but does not necessarily reduce the scope; it may expand testing capabilities.
Option D (Increases the auditor’s objectivity):
Objectivity is an ethical requirement rather than a direct effect of data analysis.
Data analytics enhances internal audit testing by providing deeper insights into high-risk areas.
IIA Standard 1220 and GTAG 16 emphasize data analytics in risk-based auditing.
Final Justification:IIA References:
IPPF Standard 1220 – Due Professional Care
IIA GTAG 16 – Data Analytics in Auditing
COSO Framework – Data-Driven Risk Management
While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?
Review the call center script used by customer service agents to interact with callers, and update the script if necessary.
Be-emphasize the importance of call center employees completing a certain number of calls per hour.
Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.
Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily
Understanding the Call Center Performance Issue:
The key performance indicators (KPIs) show a positive trend, meaning the call center appears to be performing well.
However, customer complaints are increasing, indicating that the KPIs are not accurately reflecting service quality.
This suggests that employees may be prioritizing call quantity over call quality, likely due to pressure to meet call quotas.
Why De-Emphasizing Call Quotas is the Best Solution:
Encourages Quality Over Speed: Reducing the emphasis on call volume allows agents to spend more time resolving customer issues effectively.
Improves Customer Satisfaction: Agents can provide more thorough assistance, reducing repeat calls and complaints.
Aligns KPIs with Service Quality: Shifting focus from quantity-based KPIs to quality-based KPIs ensures performance measurements reflect actual customer experience.
Why Other Options Are Incorrect:
A. Review the call center script used by customer service agents to interact with callers, and update the script if necessary – Incorrect.
While updating scripts may help, it does not address the root issue of employees rushing through calls to meet quotas.
C. Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve – Incorrect.
Training is useful, but if agents are pressured to complete calls quickly, training alone will not resolve the issue.
D. Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily – Incorrect.
This would worsen the issue by further incentivizing speed over customer satisfaction, leading to more complaints.
IIA’s Perspective on Performance Metrics and Customer Service Quality:
IIA Standard 2120 – Risk Management requires organizations to ensure that performance metrics align with actual business objectives.
IIA GTAG (Global Technology Audit Guide) on Performance Measurement recommends balancing quantitative KPIs (e.g., call volume) with qualitative KPIs (e.g., customer satisfaction scores).
COSO Internal Control Framework supports adjusting performance incentives to ensure alignment with business objectives.
IIA References:
IIA Standard 2120 – Risk Management & KPI Alignment
IIA GTAG – Performance Metrics in Customer Service
COSO Internal Control Framework – Effective KPI Design
Thus, the correct and verified answer is B. De-emphasize the importance of call center employees completing a certain number of calls per hour.
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
The organization's operating expenses are increasing.
The organization has adopted just-in-time inventory.
The organization is experiencing Inventory theft
The organization's inventory is overstated.
A declining inventory turnover means that inventory is sitting longer before being sold, while an increasing gross margin rate suggests the company is making higher profits on each sale. This combination is often a sign of inventory overstatement, possibly due to accounting errors or fraud.
Correct Answer (D - The Organization’s Inventory is Overstated)
Inventory turnover ratio = Cost of Goods Sold (COGS) / Average Inventory. A declining inventory turnover indicates higher inventory levels relative to sales.
Gross margin rate = (Revenue - COGS) / Revenue. An increasing gross margin means either higher selling prices or lower COGS.
Overstating inventory artificially reduces COGS, making gross margin appear higher.
The IIA’s GTAG 8: Audit of Inventory Management explains that inflated inventory levels can distort financial reporting and lead to misinterpretations of business performance.
Why Other Options Are Incorrect:
Option A (Operating expenses are increasing):
An increase in operating expenses would not directly explain declining inventory turnover or increasing gross margin.
Gross margin focuses on revenue and COGS, not operating expenses.
Option B (Just-in-Time Inventory):
A just-in-time (JIT) system reduces inventory levels, leading to higher inventory turnover, which contradicts the scenario.
Option C (Inventory Theft):
If theft were occurring, inventory levels would decrease, leading to higher turnover, not declining turnover.
GTAG 8: Audit of Inventory Management – Discusses inventory valuation risks, including overstatement and its impact on financial ratios.
IIA Practice Guide: Assessing Inventory Risks – Covers fraud risks related to inventory manipulation.
Step-by-Step Explanation:IIA References for Validation:Thus, the best explanation for a declining inventory turnover with an increasing gross margin rate is inventory overstatement (D).
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
The auditor eliminated duplicate information.
The auditor organized data to minimize useless information.
The auditor made data usable for a specific purpose by ensuring that anomalies were Identified and corrected.
The auditor ensured data fields were consistent and that data could be used for a specific purpose.
Data cleaning and normalization are essential steps in the data analytics process to ensure that data is accurate, complete, and useful for analysis. The primary purpose of these steps is to identify and correct anomalies, inconsistencies, and errors, making the data usable for decision-making.
(A) The auditor eliminated duplicate information. ❌
Incorrect. Removing duplicates is one part of data cleaning, but it does not encompass the full process of making data usable.
(B) The auditor organized data to minimize useless information. ❌
Incorrect. While organizing data helps improve efficiency, it does not necessarily involve error detection and correction, which is key to data cleaning.
(C) The auditor made data usable for a specific purpose by ensuring that anomalies were identified and corrected. ✅
Correct. The primary goal of cleaning and normalizing data is to detect and fix anomalies (e.g., missing values, inconsistencies, formatting errors), ensuring that data is reliable for analysis.
IIA GTAG "Data Analytics: Elevating Internal Audit Performance" highlights that correcting data anomalies is a critical step in preparing data for effective use.
(D) The auditor ensured data fields were consistent and that data could be used for a specific purpose. ❌
Incorrect. While consistency in data fields is part of normalization, it does not fully address the broader purpose of identifying and fixing errors.
IIA GTAG – "Data Analytics: Elevating Internal Audit Performance"
IIA Standard 2320 – Analysis and Evaluation
NIST Data Quality Framework – Data Cleaning and Normalization
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as data cleaning and normalization ensure that anomalies are detected and corrected, making the data usable for a specific purpose
A one-time password would most likely be generated in which of the following situations?
When an employee accesses an online digital certificate
When an employee's biometrics have been accepted.
When an employee creates a unique digital signature,
When an employee uses a key fob to produce a token.
A one-time password (OTP) is a unique, temporary password that is valid for a single login session or transaction. It is commonly used in multi-factor authentication (MFA) systems to enhance security.
Correct Answer (D - When an Employee Uses a Key Fob to Produce a Token)
Key fobs generate a time-sensitive one-time password (OTP), which is used in conjunction with a traditional password to enhance security.
These devices are part of two-factor authentication (2FA) or multi-factor authentication (MFA) methods.
The IIA GTAG 9: Identity and Access Management discusses OTP tokens as a strong security control to prevent unauthorized access.
Why Other Options Are Incorrect:
Option A (When an employee accesses an online digital certificate):
Digital certificates authenticate users or devices, but they do not generate one-time passwords.
Option B (When an employee's biometrics have been accepted):
Biometric authentication (e.g., fingerprint, facial recognition) grants access based on biological traits, not an OTP.
Option C (When an employee creates a unique digital signature):
Digital signatures authenticate documents and transactions, but they are not time-sensitive one-time passwords.
IIA GTAG 9: Identity and Access Management – Covers OTP tokens as a security measure.
IIA Practice Guide: Auditing IT Security Controls – Recommends OTPs as part of secure authentication.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because key fobs generate one-time passwords for secure authentication.
Which of the following is a likely result of outsourcing?
Increased dependence on suppliers.
Increased importance of market strategy.
Decreased sensitivity to government regulation
Decreased focus on costs
Understanding Outsourcing and Its Impact:
Outsourcing refers to contracting external vendors to handle business functions that were previously managed in-house.
While it can reduce costs and improve efficiency, it increases reliance on external suppliers for critical services.
Why Increased Dependence on Suppliers is the Most Likely Result:
Loss of Internal Control: Companies lose direct oversight over quality, delivery times, and operational processes, depending on the supplier’s performance.
Risk of Supplier Disruptions: If the supplier faces financial difficulties, operational failures, or compliance issues, the outsourcing company is directly affected.
Vendor Lock-in: Over time, switching suppliers becomes difficult due to integration costs and proprietary dependencies.
Why Other Options Are Incorrect:
B. Increased importance of market strategy – Incorrect.
While outsourcing can free up resources to focus on core business strategy, it does not necessarily increase the importance of market strategy.
C. Decreased sensitivity to government regulation – Incorrect.
Outsourcing often increases regulatory risks, as companies must ensure third-party compliance with data protection, labor laws, and industry regulations.
D. Decreased focus on costs – Incorrect.
Outsourcing is typically done to reduce costs, not decrease cost focus. Organizations still monitor costs closely to ensure vendor contracts remain cost-effective.
IIA’s Perspective on Outsourcing and Risk Management:
IIA Standard 2120 – Risk Management requires internal auditors to evaluate risks associated with outsourcing.
IIA GTAG (Global Technology Audit Guide) on Third-Party Risk Management highlights risks related to supplier dependence, service quality, and compliance.
COSO ERM Framework recommends ongoing supplier performance monitoring to mitigate risks of over-dependence.
IIA References:
IIA Standard 2120 – Risk Management & Vendor Oversight
IIA GTAG – Third-Party Risk Management
COSO ERM – Managing Outsourcing Risks
Thus, the correct and verified answer is A. Increased dependence on suppliers.
Which of the following is a disadvantage in a centralized organizational structure?
Communication conflicts
Slower decision making.
Loss of economies of scale
Vulnerabilities in sharing knowledge
A centralized organizational structure concentrates decision-making authority at the top levels of management. While this ensures control and consistency, it can lead to slower decision-making due to the need for approvals from higher levels.
Let’s analyze each option:
Option A: Communication conflicts.
Incorrect.
Centralized structures generally have clear lines of authority and communication, reducing conflicts.
Communication conflicts are more common in decentralized structures where multiple decision-makers exist.
Option B: Slower decision making.
Correct.
Since all decisions must pass through top management, it delays responses to market changes and reduces flexibility.
Lower-level employees have less authority to make operational decisions, leading to bottlenecks.
IIA Reference: Internal auditors assess organizational governance, including decision-making efficiency in centralized vs. decentralized structures. (IIA Practice Guide: Organizational Governance)
Option C: Loss of economies of scale.
Incorrect.
Centralization improves economies of scale by standardizing processes and consolidating resources.
Decentralization (not centralization) is more likely to lead to duplication of efforts and a loss of economies of scale.
Option D: Vulnerabilities in sharing knowledge.
Incorrect.
Centralized organizations tend to have structured knowledge-sharing frameworks, such as standardized policies and corporate training programs.
A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?
Cost of sales and net income are understated
Cost of sales and net income are overstated
Cost of sales is understated and net income is overstated
Cost of sales is overstated and net income is understated
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An extranet.
A local area network (LAN).
An intranet.
The internet.
Comprehensive and Detailed In-Depth Explanation:
An intranet is a private network used by an organization for internal communication and information sharing among employees. It is accessible only to authorized personnel within the company.
Option A (Extranet) – Allows external parties (e.g., suppliers, partners) to access limited information.
Option B (LAN) – Refers to a network infrastructure rather than controlled access.
Option D (Internet) – Is public and not restricted to internal personnel.
Thus, Option C (Intranet) is the correct answer as it ensures access only to organizational personnel.
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
To ensure proper segregation of duties
To create a master repository of user passwords
To enable monitoring for systems efficiencies
To enable tracking of privileges granted to users over time
Which of the following lists is comprised of computer hardware only?
A central processing unit, a scanner, and a value-added network
A computer chip, a data warehouse, and a router
A server, a firewall, and a smartphone
A workstation, a modem, and a disk drive
Comprehensive and Detailed In-Depth Explanation:
Computer hardware refers to the physical components of a computer system.
Workstation: A high-performance computer designed for technical or scientific applications.
Modem: A device that modulates and demodulates signals for data transmission over communication lines.
Disk drive: A device that reads and/or writes data to a disk storage medium.
Option D lists only physical components, fitting the definition of computer hardware.
In contrast:
Value-added network (option A): A hosted service offering specialized networking services, not a physical component.
Data warehouse (option B): A system used for reporting and data analysis, representing a data storage concept rather than a physical device.
Firewall (option C): While it can be hardware, it is often implemented as software; thus, the term doesn't exclusively denote hardware.
Therefore, option D accurately represents a list of computer hardware components.
References:
The Institute of Internal Auditors. (n.d.). CIA Exam Syllabus. Retrieved from [https://www.theiia.org/en/certifications/cia
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software.
Updating operating software in a haphazard manner.
Applying a weak password for access to a mobile device.
Jailbreaking a locked smart device.
Comprehensive and Detailed In-Depth Explanation:
Jailbreaking a locked smart device (removing manufacturer-imposed restrictions) increases the risk of infringing on copyright and privacy laws, as it allows unauthorized access to software and applications.
Option A (Not installing anti-malware software) – Increases security risks but does not directly violate regulations.
Option B (Haphazard OS updates) – Can lead to vulnerabilities but is not a legal issue.
Option C (Weak passwords) – Poses a security threat but does not impact compliance with laws.
Since jailbreaking often violates software licenses and may lead to illegal use of software, Option D is the correct answer.
Which of the following is a systems software control?
Restricting server room access to specific individuals.
Housing servers with sensitive software away from environmental hazards.
Ensuring that all user requirements are documented.
Performing intrusion testing on a regular basis.
Comprehensive and Detailed In-Depth Explanation:
System software controls are mechanisms designed to protect system integrity, security, and performance. Among the given options, performing intrusion testing on a regular basis (D) is a proactive security measure that tests an organization's IT infrastructure to identify vulnerabilities and weaknesses in system security.
Option A (Restricting server room access) is a physical security control, not a system software control.
Option B (Housing servers securely) is an environmental control, focusing on protecting hardware.
Option C (Ensuring documentation of user requirements) relates to project management and system development, rather than system software security.
Since intrusion testing ensures system resilience against cyber threats, option D is the correct answer.
Which of the following describes the primary advantage of using data analytics in internal auditing?
It helps support the internal audit conclusions with factual evidence.
It reduces the time and effort needed to prepare the audit report.
It helps prevent internal auditors from unknowingly disregarding key process risks.
It enables internal auditors to meet their responsibility for monitoring controls.
Comprehensive and Detailed In-Depth Explanation:
Data analytics in internal auditing provides quantitative, evidence-based insights, enhancing audit conclusions and decision-making.
Option B (Reduces report preparation time) – While efficiency is a benefit, the main advantage is improved accuracy and factual support.
Option C (Prevents overlooking risks) – While true, data analytics primarily strengthens evidence collection.
Option D (Monitoring controls) – Auditors assess controls, but data analytics enhances findings through data-driven validation.
Thus, Option A is correct, as data analytics strengthens audit conclusions with factual evidence.
Which of the following risks would involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
Tampering
Hacking
Phishing
Piracy
According to IIA guidance, which of the following statements is true regarding analytical procedures?
Data relationships are assumed to exist and to continue where no known conflicting conditions exist
Analytical procedures are intended primarily to ensure the accuracy of the information being examined
Data relationships cannot include comparisons between operational and statistical data
Analytical procedures can be used to identify differences, but cannot be used to identify the absence of differences
An internal auditor was asked to review an equal equity partnership. In one sampled transaction, Partner A transferred equipment into the partnership with a self-declared value of $10,000, and Partner B contributed equipment with a self-declared value of $15,000. The capital accounts of each partner were subsequently credited with $12,500. Which of the following statements is true regarding this transaction?
The capital accounts of the partners should be increased by the original cost of the contributed equipment.
The capital accounts should be increased using a weighted average based on the current percentage of ownership.
No action is necessary as the capital account of each partner was increased by the correct amount.
The capital accounts of the partners should be increased by the fair market value of their contribution.
Comprehensive and Detailed In-Depth Explanation:
Partnership contributions should be recorded at their fair market value (FMV) at the time of contribution, ensuring equitable financial representation.
Option A (Original cost of the equipment) – Not appropriate since the asset’s current fair value is relevant, not its historical cost.
Option B (Weighted average approach) – Not applicable; capital accounts should reflect actual contributed value.
Option C (No action necessary) – Incorrect because partners contributed assets of different values, making an equal capital credit unfair.
Since partnership accounting requires fair market value for capital accounts, Option D is correct.
Which of the following represents an example of a physical security control?
Access rights are allocated according to the organization’s policy
There is confirmation that data output is accurate and complete
Servers are located in locked rooms to which access is restricted
A record is maintained to track the process from data input to storage
Given the information below, which organization is in the weakest position to pay short-term debts?
Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000
Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000
Organization C: Current assets constitute $900,000; Current liabilities are $300,000
Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000
Organization A
Organization B
Organization C
Organization D
Which of the following situations best applies to an organization that uses a project, rather than a process, to accomplish its business activities?
A clothing company designs, makes, and sells a new item
A commercial construction company is hired to build a warehouse
A city department sets up a new firefighter training program
A manufacturing organization acquires component parts from a contracted vendor
An organization uses the management-by-objectives method, whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
It is particularly helpful to management when the organization is facing rapid change
It is a more successful approach when adopted by mechanistic organizations
It is more successful when goal-setting is performed not only by management, but by all team members, including lower-level staff
It is particularly successful in environments that are prone to having poor employer-employee relations
An internal auditor found the following information while reviewing the monthly financial statements for a wholesaler of safety glasses: Opening inventory: 1,000 units at $2 per unit; Purchased: 5,000 units at $3 per unit; Sold: 3,000 units at $7 per unit. The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
Average cost method
First-in, first-out (FIFO) method
Specific identification method
Activity-based costing method
The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
Favorable labor efficiency variance
Adverse labor rate variance
Adverse labor efficiency variance
Favorable labor rate variance
1 and 2.
1 and 4.
3 and 4.
2 and 3.
Comprehensive and Detailed In-Depth Explanation:
A favorable labor efficiency variance (Option 1) occurs because experienced workers complete tasks more efficiently, reducing time and waste.
An adverse labor rate variance (Option 2) arises because hiring experienced employees increases labor costs compared to budgeted rates.
Option 3 (Adverse labor efficiency variance) is incorrect because skilled workers typically improve efficiency.
Option 4 (Favorable labor rate variance) is incorrect because higher wages increase costs, leading to an adverse variance.
Thus, the correct answer is A (1 and 2 only).
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Hot recovery plan
Warm recovery plan
Cold plan
Absence of recovery plan
With regard to project management, which of the following statements about project crashing is true?
It leads to an increase in risk and often results in rework.
It is an optimization technique where activities are performed in parallel rather than sequentially.
It involves a revaluation of project requirements and/or scope.
It is a compression technique in which resources are added to the project.
Comprehensive and Detailed In-Depth Explanation:
Project crashing is a schedule compression technique used in project management to shorten the project duration without altering the project scope. This is achieved by allocating additional resources to critical path activities, thereby reducing their completion time. While this approach can lead to increased costs due to the added resources, it helps in meeting tight deadlines. It's important to note that crashing focuses on accelerating project timelines by adding resources, not by changing the sequence of activities (as in fast-tracking) or by reassessing project requirements. However, project crashing can increase risks and may lead to rework if not managed carefully.
Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?
Remote wipe.
Software encryption.
Device encryption.
Authentication.
Comprehensive and Detailed In-Depth Explanation:
Authentication ensures that only authorized users can access a system by requiring credentials such as PINs, passwords, or biometrics.
Option A (Remote wipe) – Deletes data but does not control initial access.
Option B (Software encryption) – Protects stored data, not user access.
Option C (Device encryption) – Secures the device, but authentication controls access.
Since authentication ensures secure user verification, Option D is correct.
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
There is a higher reliance on organizational culture.
There are clear expectations set for employees.
There are electronic monitoring techniques employed.
There is a defined code for employee behavior.
Comprehensive and Detailed In-Depth Explanation:
A decentralized organizational structure distributes decision-making authority across multiple levels. This requires a strong organizational culture to guide decision-making in the absence of centralized control.
Option B (Clear expectations) – While true, this applies to both centralized and decentralized structures.
Option C (Electronic monitoring) – More common in centralized control environments.
Option D (Defined code of behavior) – Found in all organizations, not unique to decentralization.
Since decentralized organizations rely more on cultural alignment, Option A is correct.
According to IIA guidance, which of the following are typical physical and environmental IT controls?
Locating servers in locked rooms with restricted admission.
Applying encryption where confidentiality is a stated requirement.
Allocating and controlling access rights according to the organization's stated policy.
Ensuring a tightly controlled process for applying all changes and patches to software, systems, network components, and data.
Comprehensive and Detailed In-Depth Explanation:
Physical and environmental IT controls focus on securing IT infrastructure against unauthorized access and environmental hazards. Locating servers in locked rooms with restricted admission protects hardware from theft, tampering, and environmental risks.
Option B (Applying encryption) – A logical security control, not a physical one.
Option C (Access rights allocation) – A logical control related to identity management.
Option D (Software patch control) – Part of IT governance and system maintenance, not physical security.
Since physical access control is a critical component of IT security, Option A is correct.
Which of the following forms of compensation best indicates that an organization’s cost-saving objectives have been targeted?
Gain sharing
Commission
Profit sharing
Pension
Comprehensive and Detailed In-Depth Explanation:
Gain sharing is a compensation program where employees receive bonuses tied directly to the company's cost-saving measures and productivity improvements. This approach aligns employees' interests with organizational goals by rewarding them for identifying and implementing efficiencies that reduce costs. Unlike profit sharing, which is based on overall profitability, gain sharing focuses specifically on performance improvements that lead to cost savings. Commissions are typically related to sales performance, and pensions are long-term retirement benefits not directly linked to immediate cost-saving efforts. Therefore, gain sharing is the most indicative of targeting cost-saving objectives.
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?
Anti-malware software
Authentication
Spyware
Rooting
Which of the following is used during all three stages of project management?
Earned Value Management (EVM).
Organizational procedures.
Performance measurement.
Project Management Information System (PMIS).
Comprehensive and Detailed In-Depth Explanation:
A Project Management Information System (PMIS) is a centralized tool used throughout a project's planning, execution, and monitoring phases. It helps track schedules, costs, and risks.
Option A (EVM) – Used primarily in monitoring and control phases, not all three.
Option B (Organizational procedures) – Provides guidance but is not actively used in all project phases.
Option C (Performance measurement) – Important in monitoring, but not central to planning or execution.
Since PMIS is used throughout the project lifecycle, Option D is correct.
An internal auditor is assessing the risks related to an organization’s mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal auditor be most concerned about?
Compliance.
Privacy.
Strategic.
Physical security.
Comprehensive and Detailed In-Depth Explanation:
Allowing external devices to access proprietary systems introduces compliance risks, as these devices may not meet the organization’s security, data protection, and regulatory standards.
Option B (Privacy) – Important but does not fully capture the risk of unauthorized access or non-compliance with security protocols.
Option C (Strategic) – Strategic risks relate to business direction, not security concerns with third-party access.
Option D (Physical security) – Physical risks involve device theft, which is secondary to compliance when granting access.
Since compliance violations can lead to regulatory penalties and data breaches, Option A (Compliance) is the correct answer.
Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?
A traditional key lock.
A biometric device.
A card-key system.
A proximity device.
Comprehensive and Detailed In-Depth Explanation:
Biometric authentication (e.g., fingerprint, retina scan) is the most difficult to revoke because it is linked to an individual’s physical attributes, which cannot be changed like passwords or physical devices.
Option A (Traditional key lock) – Can be revoked by retrieving the key or changing the lock.
Option C (Card-key system) – Can be revoked by deactivating the card.
Option D (Proximity device) – Can be revoked by disabling the device.
Since biometric data is permanently tied to an individual, revoking access is complex, making Option B the correct answer.
A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Lack of coordination among different business units
Operational decisions are inconsistent with organizational goals
Suboptimal decision-making
Duplication of business activities
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized data?
The auditor eliminated duplicate information
The auditor organized data to minimize useless information
The auditor made data usable for a specific purpose by ensuring that anomalies were identified and addressed
The auditor ensured data fields were consistent and that data could be used for a specific purpose
According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?
Report identifying data that is outside of system parameters.
Report identifying general ledger transactions by time and individual.
Report comparing processing results with original input.
Report confirming that the general ledger data was processed without error.
Comprehensive and Detailed In-Depth Explanation:
A management (audit) trail ensures financial transparency by tracking who initiated, approved, and processed transactions within the general ledger (GL).
Option A (Report on data outside system parameters) is a validity control, not an audit trail.
Option C (Comparison of results with input) ensures accuracy but is not a comprehensive audit trail.
Option D (Error-free processing confirmation) does not track user activity.
Since audit trails require tracking transactions by time and individual, Option B is correct.
An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?
26 days.
90 days.
100 days.
110 days.
Comprehensive and Detailed In-Depth Explanation:
The cash conversion cycle (CCC) is calculated as:
CCC=Days Inventory Outstanding+Days Sales Outstanding−Days Payables Outstanding\text{CCC} = \text{Days Inventory Outstanding} + \text{Days Sales Outstanding} - \text{Days Payables Outstanding}CCC=Days Inventory Outstanding+Days Sales Outstanding−Days Payables Outstanding CCC=58+42−10=90 daysCCC = 58 + 42 - 10 = 90 \text{ days}CCC=58+42−10=90 days
Option A (26 days) – Incorrect, as it does not account for total cycle components.
Option C (100 days) & Option D (110 days) – Overestimate the cycle by not correctly adjusting for payables.
Thus, Option B (90 days) is the correct answer.
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
The business continuity management charter
The business continuity risk assessment plan
The business impact analysis plan
The business case for business continuity planning
An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?
Designing and maintaining the database.
Preparing input data and maintaining the database.
Maintaining the database and providing its security,
Designing the database and providing its security
A database administrator (DBA) should not perform duties that compromise segregation of duties (SoD). A conflict arises when a DBA has both design and security responsibilities, as this creates a risk of unauthorized changes, fraud, or data breaches.
(A) Designing and maintaining the database.
Incorrect: These tasks are related but do not create a major conflict, as maintenance follows the design phase.
(B) Preparing input data and maintaining the database.
Incorrect: While data preparation is typically a business function, maintaining the database does not create a direct security risk.
(C) Maintaining the database and providing its security.
Incorrect: Maintenance involves technical upkeep, and while security controls are crucial, they do not inherently conflict.
(D) Designing the database and providing its security. (Correct Answer)
A DBA responsible for both design and security could create backdoors or override security settings, leading to potential data manipulation or fraud.
IIA Standard 2120 – Risk Management requires proper control segregation to prevent fraud and security risks.
IIA GTAG 4 – Management of IT Auditing recommends separation of design, security, and administration functions to minimize risks.
IIA Standard 2120 – Risk Management: Encourages proper separation of duties to mitigate risks.
IIA GTAG 4 – Management of IT Auditing: Recommends strict control over database access and security roles.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) because combining database design and security responsibilities creates a significant conflict of interest, increasing security risks.
Which of the following best describes the purpose of fixed manufacturing costs?
To ensure availability of production facilities.
To decrease direct expenses related to production.
To incur stable costs despite operating capacity.
To increase the total unit cost under absorption costing
Fixed manufacturing costs refer to costs that do not vary with the level of production activity within a relevant range. These costs include expenses such as depreciation, rent, property taxes, and salaries of permanent employees in the production facility. Their primary purpose is to ensure the availability and operational readiness of production facilities, regardless of fluctuations in production levels.
(A) Correct – To ensure availability of production facilitiesFixed manufacturing costs are incurred to maintain and operate production facilities, ensuring that they remain functional and available for production when needed. These costs exist even if no units are produced, emphasizing their role in sustaining the production infrastructure.
(B) Incorrect – To decrease direct expenses related to productionFixed manufacturing costs are unrelated to direct expenses, such as raw materials and labor, which vary with production volume. Instead, they remain constant regardless of output levels.
(C) Incorrect – To incur stable costs despite operating capacityWhile fixed costs remain stable within a relevant range, their primary purpose is not just cost stability but ensuring production facilities' availability and functionality.
(D) Incorrect – To increase the total unit cost under absorption costingUnder absorption costing, fixed manufacturing costs are allocated to units produced, affecting per-unit cost calculations. However, this is an accounting treatment rather than the core purpose of fixed manufacturing costs.
IIA’s Global Internal Audit Standards – Managing Resources Effectively
Fixed manufacturing costs ensure operational resources are available and managed efficiently.
IIA’s Guide on Cost Management and Internal Control
Highlights the role of cost structures, including fixed costs, in ensuring business continuity.
IIA’s Practice Advisory on Cost Accounting Controls
Discusses the importance of maintaining production facilities to ensure operational readiness.
Breakdown of Answer Choices:IIA References and Internal Auditing Standards:Would you like further clarification on any point?
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?
To inform the classification of the data population.
To determine the completeness and accuracy of the data.
To identify whether the population contains outliers.
To determine whether duplicates in the data inflate the range.
When an internal auditor calculates the mean (average), median (middle value), and range (difference between highest and lowest values) of a data population, the primary purpose is to assess the distribution of data and detect anomalies. Let’s analyze the answer choices:
Option A: To inform the classification of the data population.
Incorrect. Classification typically involves categorizing data into specific groups, which requires different statistical or analytical techniques like clustering or decision trees. Mean, median, and range are more useful for identifying distribution patterns.
Option B: To determine the completeness and accuracy of the data.
Incorrect. While summary statistics can highlight extreme values, completeness and accuracy are usually assessed through data reconciliation, validation checks, and comparison with source records.
Option C: To identify whether the population contains outliers.
Correct.
The range (difference between the largest and smallest values) helps to detect extreme values.
The mean and median can show whether the data is symmetrical or skewed (which may indicate outliers).
If the mean is significantly different from the median, it suggests potential outliers pulling the average in one direction.
IIA Reference: Internal auditors use data analytics to detect anomalies and potential fraud by identifying outliers. (IIA GTAG: Auditing with Data Analytics)
Option D: To determine whether duplicates in the data inflate the range.
Incorrect. Duplicates may affect the data set, but range calculations alone do not determine whether duplicates exist. Duplicate identification usually involves checking for repeated entries, not just extreme values.
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.
Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
When an organization integrates governance, risk, and compliance (GRC) activities into a centralized technology-based resource, enterprise governance must ensure that the system:
Supports strategic decision-making by the board and senior management.
Provides accurate, reliable, and quality information to demonstrate an effective governance framework.
Aligns with IIA Standard 2110 – Governance, which requires auditors to assess whether the organization’s governance structure supports accountability, transparency, and effective decision-making.
(A) The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided. (Correct Answer)
Governance is about ensuring that stakeholders, particularly the board, have confidence in the organization's control environment and decision-making process.
IIA Standard 2110 (Governance) states that internal auditors must evaluate the adequacy and effectiveness of governance structures.
A GRC system should ensure transparency, accountability, and quality reporting to enable strategic governance oversight.
(B) Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
While improving efficiency is a benefit of a GRC system, it is a secondary objective, not a primary enterprise governance concern.
(C) Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
Tracking risk metrics is useful but does not directly address governance at the board level, making this answer incomplete.
(D) Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
Analytics support monitoring, but the core governance concern is ensuring the board’s confidence in the system.
IIA Standard 2110 – Governance: Internal auditors must assess whether governance processes are effective.
GTAG 1 – Information Technology Risks and Controls: IT governance must provide quality, reliable information for decision-making.
COSO ERM Framework: Emphasizes governance as a key driver of enterprise risk management.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (A) because effective enterprise governance relies on accurate and high-quality information for strategic decision-making.
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
An incorrect program fix was implemented just prior to the database backup.
The organization is preparing to train all employees on the new self-service benefits system.
There was a data center failure that requires restoring the system at the backup site.
There is a need to access prior year-end training reports for all employees in the human resources database
The most recent backup is primarily used to restore lost data in the event of a system failure, data corruption, or cyberattack. If a data center failure occurs, the latest backup is the best source to recover the human resources database and resume operations.
(A) Incorrect – An incorrect program fix was implemented just prior to the database backup.
If an incorrect fix was applied before the backup, restoring the latest backup would still contain the error.
The organization would need to restore an earlier version before the faulty update.
(B) Incorrect – The organization is preparing to train all employees on the new self-service benefits system.
The latest backup is not needed for training; the live system or historical data would be used instead.
(C) Correct – There was a data center failure that requires restoring the system at the backup site.
In the event of a system failure, restoring from the most recent backup minimizes data loss and downtime.
This is the primary reason for maintaining regular backups.
(D) Incorrect – There is a need to access prior year-end training reports for all employees in the human resources database.
Historical records would likely be stored in archived backups or reports, not the latest backup.
The most recent backup contains current data, not old reports.
IIA’s GTAG (Global Technology Audit Guide) – IT Disaster Recovery and Backup Strategies
Covers the importance of backups in system restoration.
NIST Cybersecurity Framework – Data Recovery and Business Continuity
Recommends frequent backups to protect against system failures.
ISO 22301 – Business Continuity Management
Defines recovery procedures and best practices for backup site restoration.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
Estimate time required to complete the whole project.
Determine the responses to expected project risks.
Break the project into manageable components.
Identify resources needed to complete the project
The first step in a project management plan is to break the project into manageable components, known as Work Breakdown Structure (WBS). This step ensures clarity, task allocation, and effective tracking.
(A) Estimate time required to complete the whole project.
Incorrect: Time estimation comes after breaking the project into smaller tasks.
(B) Determine the responses to expected project risks.
Incorrect: Risk management is important but is planned after defining project tasks and scope.
(C) Break the project into manageable components. (Correct Answer)
Dividing the project into smaller tasks (WBS) helps in resource allocation, scheduling, and risk assessment.
IIA GTAG 12 – Project Risk Management suggests using WBS to define tasks clearly.
(D) Identify resources needed to complete the project.
Incorrect: Resources can only be allocated effectively after defining project components.
IIA GTAG 12 – Project Risk Management: Recommends Work Breakdown Structure (WBS) as the first step in project planning.
PMBOK (Project Management Body of Knowledge): Defines WBS as the foundation of project planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (C) Break the project into manageable components, as this is the first step in structuring and planning a successful project.
Which of the following statements is true regarding user-developed applications (UDAs)?
UDAs are less flexible and more difficult to configure than traditional IT applications.
Updating UDAs may lead to various errors resulting from changes or corrections.
UDAs typically are subjected to application development and change management controls.
Using UDAs typically enhances the organization's ability to comply with regulatory factors.
User-Developed Applications (UDAs) are applications, spreadsheets, databases, or tools created and maintained by end-users rather than IT departments. They provide flexibility but also introduce risks related to security, accuracy, and change management.
Why Option B is Correct:
UDAs lack formal change management controls.
Since they are typically not subject to rigorous testing and documentation, modifications may introduce errors.
Updating or correcting a formula, macro, or script in a UDA may have unintended consequences that go unnoticed, leading to data integrity issues.
Why Other Options Are Incorrect:
Option A (UDAs are less flexible and more difficult to configure than traditional IT applications):
Incorrect. UDAs are more flexible and easier to modify compared to traditional IT applications, which undergo strict change controls.
Option C (UDAs typically are subjected to application development and change management controls):
Incorrect. Most UDAs lack formal governance or IT oversight. They are typically developed by business users with little or no structured IT controls.
Option D (Using UDAs typically enhances the organization’s ability to comply with regulatory factors):
Incorrect. UDAs introduce compliance risks due to lack of security, audit trails, and formal change controls.
IIA GTAG – "Auditing User-Developed Applications": Discusses risks and controls related to UDAs.
IIA Practice Advisory 2130-1 (Control Risk Self-Assessment): Highlights the importance of internal controls over UDAs.
COSO Internal Control – Integrated Framework: Recommends applying IT general controls (ITGCs) to UDAs.
IIA References:Thus, the correct answer is B. Updating UDAs may lead to various errors resulting from changes or corrections.
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
IT database administrator.
IT data center manager.
IT help desk function.
IT network administrator.
Maintaining the infrastructure for a real-time database backup involves ensuring that backups are correctly configured, continuously running, and fail-safe mechanisms are in place to prevent data loss. The most appropriate role for this responsibility is the IT database administrator (DBA) because:
Primary Role of a DBA:
The DBA is responsible for managing database performance, availability, backup strategies, and recovery processes.
Ensures that real-time backups are functioning properly and failure risks are mitigated.
Database Infrastructure & Backup Strategies:
DBAs configure, monitor, and troubleshoot real-time backup solutions such as replication, mirroring, and log shipping.
They work with backup tools like Oracle Data Guard, SQL Server Always On, and MySQL replication.
Disaster Recovery & Data Integrity:
The DBA ensures data consistency and integrity, especially during system failures or cyber incidents.
They set up recovery point objectives (RPO) and recovery time objectives (RTO) for database resilience.
Option B (IT Data Center Manager):
Oversees physical and environmental infrastructure (e.g., servers, cooling, and power systems). Not directly responsible for database backup failure prevention. (Incorrect)
Option C (IT Help Desk Function):
Provides user support and troubleshooting but does not manage backup infrastructure. (Incorrect)
Option D (IT Network Administrator):
Manages network configurations, security, and connectivity but does not handle database backup infrastructure. (Incorrect)
IIA GTAG – "Auditing Business Continuity and Disaster Recovery": Emphasizes the role of DBAs in backup infrastructure.
COBIT 2019 – BAI10.02 (Manage Backup and Restore): Assigns database backup management responsibilities primarily to DBAs.
IIA's "Auditing IT Operations": Recommends that database administration teams ensure backup mechanisms are tested regularly.
Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. IT database administrator.
Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
Last-in-first-Out (LIFO}.
Average cost.
First-in-first-out (FIFO).
Specific identification
The specific identification method is an inventory costing approach where the actual cost of each individual unit sold is recorded. This method is used when items are uniquely identifiable, such as in industries dealing with luxury goods, automobiles, or custom-manufactured products.
Correct Answer (D - Specific identification)
Under the specific identification method, each inventory unit is tracked separately, and its actual purchase cost is assigned to the cost of goods sold (COGS) when sold.
This method is commonly used for high-value, low-volume items where unique tracking is feasible.
The IIA’s GTAG 8: Audit of Inventory Management explains how different costing methods impact financial reporting and internal controls.
Why Other Options Are Incorrect:
Option A (LIFO - Last-in, First-out):
LIFO assumes that the most recent (last-in) inventory is sold first, but it does not track actual unit cost. Instead, it assigns the cost of the newest inventory to COGS.
LIFO is often used for tax benefits but does not follow actual unit cost identification.
Option B (Average cost):
The weighted average cost method calculates an average cost for all inventory units rather than assigning actual unit costs.
This method smooths out price fluctuations but does not track specific items' costs.
Option C (FIFO - First-in, First-out):
FIFO assumes that the oldest (first-in) inventory is sold first, assigning its cost to COGS.
However, like LIFO, it does not track individual unit costs.
IIA GTAG 8: Audit of Inventory Management – Explains different inventory costing methods, including specific identification.
IIA Practice Guide: Assessing Inventory Risks – Covers inventory valuation and fraud risks.
Step-by-Step Explanation:IIA References for Validation:Thus, the specific identification method (D) is the only one that accounts for the actual cost paid for each unit sold.
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
Key performance indicators.
Reports of software customization.
Change and patch management.
Master data management
When implementing big data systems, organizations must establish ongoing production monitoring to ensure system performance, efficiency, and reliability.
Why Option A (Key performance indicators) is Correct:
KPIs (Key Performance Indicators) measure the effectiveness and success of big data systems.
KPIs help track system efficiency, data processing speed, accuracy, and resource utilization during production.
Examples of KPIs in big data systems include data ingestion rate, processing time, query performance, system uptime, and error rates.
Why Other Options Are Incorrect:
Option B (Reports of software customization):
Incorrect because software customization reports document system modifications but do not monitor system performance.
Option C (Change and patch management):
Incorrect because change and patch management deals with software updates and security fixes, not ongoing performance monitoring.
Option D (Master data management):
Incorrect because master data management focuses on data governance and consistency, not real-time system performance.
IIA GTAG – "Auditing Big Data Systems": Recommends using KPIs to measure the effectiveness of big data implementation.
COBIT 2019 – APO08 (Manage Performance and Capacity): Emphasizes KPI tracking for IT and data system performance.
NIST Big Data Framework: Highlights the importance of KPIs for monitoring big data system performance.
IIA References:
Which of the following measures the operating success of a company for a given period of time?
Liquidity ratios.
Profitability ratios.
Solvency ratios.
Current ratios.
Profitability ratios measure a company's ability to generate profit over a specific period, making them the best indicators of operating success. These ratios assess financial performance by comparing income to various financial metrics such as revenue, assets, and equity.
Correct Answer (B - Profitability Ratios)
Profitability ratios reflect how effectively a company generates income from its operations over a given period.
Key profitability ratios include:
Gross Profit Margin: Measures how efficiently a company produces goods and services.
Operating Profit Margin: Shows profitability from core operations.
Net Profit Margin: Indicates the percentage of revenue converted into profit.
Return on Assets (ROA): Measures how efficiently assets generate earnings.
Return on Equity (ROE): Assesses how well equity investments generate returns.
The IIA Practice Guide: Auditing Financial Performance emphasizes profitability ratios in evaluating operational success.
Why Other Options Are Incorrect:
Option A (Liquidity Ratios):
Liquidity ratios measure a company's ability to meet short-term obligations rather than its operating success.
Examples: Current Ratio, Quick Ratio.
IIA GTAG 13: Business Performance emphasizes that liquidity ratios relate to short-term financial health, not operating success.
Option C (Solvency Ratios):
Solvency ratios evaluate a company's ability to meet long-term financial obligations, not operating performance.
Examples: Debt-to-Equity Ratio, Interest Coverage Ratio.
Option D (Current Ratio):
The current ratio is a liquidity ratio, measuring whether a company can meet its short-term liabilities with current assets.
It does not directly assess profitability or operational success.
IIA Practice Guide: Auditing Financial Performance – Covers the role of profitability ratios in evaluating a company’s success.
IIA GTAG 13: Business Performance – Discusses financial analysis, including profitability, liquidity, and solvency metrics.
Step-by-Step Explanation:IIA References for Validation:Thus, profitability ratios (B) are the best measures of a company’s operating success over a period.
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
The spam filter removed Incoming communication that included certain keywords and domains.
The spam filter deleted commercial ads automatically, as they were recognized as unwanted.
The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.
The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
A false positive occurs when a system incorrectly identifies a legitimate item as a threat or an unwanted entity. In the case of a spam filter, a false positive happens when the filter mistakenly classifies a genuine email as spam, even though it is legitimate.
Option A: "The spam filter removed incoming communication that included certain keywords and domains."
This describes a general filtering mechanism but does not indicate a mistake. If the filter was correctly configured, it is not necessarily a false positive. (Incorrect)
Option B: "The spam filter deleted commercial ads automatically, as they were recognized as unwanted."
If the ads were indeed unwanted, this is a true positive, meaning the system worked correctly. (Incorrect)
Option C: "The spam filter routed to the 'junk' folder a newsletter that appeared to include links to fake websites."
If the newsletter contained suspicious links, the filter was functioning as designed. This is not necessarily an error. (Incorrect)
Option D: "The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday."
This is a clear example of a false positive because the email was not spam or malicious, yet the filter mistakenly blocked it. (Correct Answer)
IIA GTAG (Global Technology Audit Guide) on Cybersecurity and IT Risks: Discusses false positives and negatives in automated security controls.
IIA’s "Auditing IT Security Controls" Report: Emphasizes the need for tuning security filters to reduce false positives.
COBIT 2019 – DSS05.07 (Manage Security Services): Highlights the importance of minimizing false positives to ensure business communication is not disrupted.
Analysis of Each Option:IIA References:Thus, the correct answer is D. The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
When determining the level of physical controls required for a workstation, which of the following factors should be considered?
Ease of use.
Value to the business.
Intrusion prevention.
Ergonomic model.
When determining the level of physical controls required for a workstation, the most critical factor is its value to the business. Physical controls are security measures implemented to protect assets from unauthorized access, damage, or theft.
Asset Value → Determines the level of protection required.
Risk Assessment → Identifies threats like theft, sabotage, or natural disasters.
Compliance Requirements → Ensures alignment with security regulations and best practices.
(A) Ease of use.
Incorrect: While user-friendliness is important, security measures are primarily based on asset value and risk, not convenience.
IIA Standard 2110 (Governance) emphasizes security over ease of use.
(B) Value to the business. (Correct Answer)
The higher the workstation's importance to business operations, the stronger the physical controls required.
Workstations handling sensitive data or critical systems require additional security.
COSO ERM – Risk Assessment requires evaluating asset value when designing security controls.
(C) Intrusion prevention.
Partially correct but secondary: Intrusion prevention is one of many security concerns, but the primary driver for determining physical controls is the asset’s business value.
(D) Ergonomic model.
Incorrect: Ergonomics is about user comfort and efficiency, not security.
IIA Standard 2120 – Risk Management: Requires risk-based decision-making, including evaluating asset value.
GTAG 9 – Identity and Access Management: Stresses that security measures must align with asset value and business risk.
COSO ERM – Risk Assessment: Establishes asset value as a key determinant in risk-based security controls.
Factors Considered in Physical Security Decisions:Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because the level of physical controls should be determined based on how critical the workstation is to business operations.
An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
A balanced scorecard.
A quality audit
Earned value analysis.
Trend analysis
Earned Value Analysis (EVA) is a project management technique that integrates scope, time, and cost data to measure project performance and progress objectively. EVA allows internal auditors to assess whether a software development project is on track by comparing planned work with completed work and actual costs.
Here’s why EVA is the most appropriate choice:
Evaluates Project Progress and Performance – EVA measures how much work has been completed against the planned schedule and budget, helping auditors analyze project efficiency.
Identifies Deviations – It highlights cost overruns or delays in task completion, which is critical for software development projects.
Uses Key Metrics – EVA includes essential indicators like:
Planned Value (PV) – The budgeted cost of work scheduled.
Earned Value (EV) – The value of actual work performed.
Actual Cost (AC) – The real cost incurred for work completed.
Schedule Variance (SV) and Cost Variance (CV) – Indicators of deviations from planned performance.
Supports Risk-Based Internal Audit Approach – The IIA emphasizes risk-based auditing, and EVA helps auditors assess risks related to project cost overruns, schedule slippage, and performance gaps.
A. A Balanced Scorecard – This measures overall organizational performance across perspectives (financial, customer, internal processes, and learning & growth), but it is not specifically designed for evaluating project task completion.
B. A Quality Audit – This focuses on compliance with quality standards and does not measure project task completion efficiency.
D. Trend Analysis – This evaluates patterns over time but does not provide a structured measurement of project progress in terms of cost, time, and completion percentage.
The IIA’s GTAG (Global Technology Audit Guide) on IT Project Management – Recommends using earned value analysis for project auditing.
IIA’s International Professional Practices Framework (IPPF) – Performance Standard 2120 (Risk Management) – Emphasizes the need for internal auditors to evaluate the effectiveness of project risk management, which EVA supports.
COSO’s Enterprise Risk Management (ERM) Framework – Encourages structured performance measurement techniques like EVA to monitor projects.
Why Not the Other Options?IIA References:Thus, Earned Value Analysis (EVA) is the correct answer because it provides a precise, quantitative way to measure project performance. ✅
An attacker, posing as a bank representative, convinced an employee to release certain, financial information that ultimately resulted in fraud. Which of the following best describes this cybersecurity risk?
Shoulder suiting
Pharming,
Phishing.
Social engineering.
Social engineering is a psychological manipulation technique used by attackers to trick individuals into divulging sensitive information. Instead of exploiting technical vulnerabilities, it targets human weaknesses such as trust, fear, or urgency.
Manipulates Human Behavior – The attacker impersonates a trusted entity (a bank representative) to deceive the employee.
Leads to Unauthorized Information Disclosure – The employee unknowingly provides sensitive financial data.
Results in Fraud – The stolen information is misused, causing financial loss.
A. Shoulder Surfing – This occurs when an attacker physically observes someone entering sensitive data (e.g., watching a person type a password).
B. Pharming – This involves redirecting users to a fraudulent website to steal their credentials, not direct impersonation.
C. Phishing – This is a broad category of social engineering that typically involves emails or fake websites, whereas this scenario describes a direct impersonation attack.
IIA’s GTAG on Cybersecurity – Discusses social engineering as a key risk for organizations.
NIST SP 800-61 (Incident Handling Guide) – Identifies social engineering as a common attack vector.
COBIT 2019 (IT Governance Framework) – Highlights human-related cybersecurity risks.
Why Social Engineering is the Correct Answer?Why Not the Other Options?IIA References:
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Cold recovery plan,
Outsourced recovery plan.
Storage area network recovery plan.
Hot recovery plan
A hot recovery plan (hot site) is a fully operational, duplicate site that is pre-configured and ready for immediate use in case of a disaster. This approach allows an organization to recover critical operations quickly with minimal downtime.
(A) Cold recovery plan.
Incorrect: A cold site is a facility that has infrastructure but no active IT systems or data until set up after a disaster, resulting in longer recovery times.
(B) Outsourced recovery plan.
Incorrect: Outsourcing recovery refers to third-party disaster recovery services, but does not specifically describe a fully operational duplicate site.
(C) Storage area network recovery plan.
Incorrect: A storage area network (SAN) recovery plan focuses on data storage redundancy, not a fully operational duplicate facility.
(D) Hot recovery plan. (Correct Answer)
A hot site is the fastest and most effective disaster recovery solution, ensuring immediate failover with minimal downtime.
IIA GTAG 10 – Business Continuity Management highlights hot sites as the most effective for mission-critical operations.
IIA GTAG 10 – Business Continuity Management: Recommends hot sites for critical recovery scenarios.
IIA Standard 2120 – Risk Management: Emphasizes preparedness for disaster recovery planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) Hot recovery plan, as it ensures a fully operational backup site for immediate disaster recovery.
Which of the following controls would be most efficient to protect business data from corruption and errors?
Controls to ensure data is unable to be accessed without authorization.
Controls to calculate batch totals to identify an error before approval.
Controls to encrypt the data so that corruption is likely ineffective.
Controls to quickly identify malicious intrusion attempts.
To efficiently protect business data from corruption and errors, the best approach is proactive detection through validation controls. Batch total calculations help verify data integrity before approval, ensuring errors are caught early.
(A) Controls to ensure data is unable to be accessed without authorization.
Incorrect: Access controls prevent unauthorized access, but they do not detect or prevent data corruption/errors.
(B) Controls to calculate batch totals to identify an error before approval. (Correct Answer)
Batch control totals ensure that data entries match expected values before processing, helping detect errors before approval.
IIA GTAG 3 – Continuous Auditing recommends automated validation and reconciliation checks for data integrity.
(C) Controls to encrypt the data so that corruption is likely ineffective.
Incorrect: Encryption protects data confidentiality, but it does not prevent or detect errors or corruption.
(D) Controls to quickly identify malicious intrusion attempts.
Incorrect: Intrusion detection systems focus on cybersecurity, not data corruption or errors.
IIA Standard 2120 – Risk Management: Recommends controls for error prevention and early detection.
IIA GTAG 3 – Continuous Auditing: Suggests automated validation processes like batch totals to detect errors before approval.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because batch total calculations effectively detect errors before approval, ensuring data integrity.
Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Rooting.
Eavesdropping.
Man in the middle.
Session hijacking.
Definition of Rooting:
Rooting (on Android) or Jailbreaking (on iOS) is the process of bypassing manufacturer and administrative security controls on a smart device.
This allows users to gain full control (root access) over the operating system, which can override security restrictions and allow installation of unauthorized applications.
How Rooting Increases Data Security Risks:
Bypassing Security Measures: Rooting removes built-in security protections, making the device more vulnerable to malware, unauthorized access, and data breaches.
Exposure to Malicious Apps: Rooted devices can install third-party applications that are not vetted by official app stores, increasing the risk of data theft, spyware, and ransomware attacks.
Circumventing Enterprise Security Policies: Many organizations use Mobile Device Management (MDM) to enforce security policies, but rooted devices can bypass these controls, exposing corporate data to cyber threats.
Increased Risk of Privilege Escalation Attacks: Attackers can exploit root access to take full control of the device, leading to unauthorized access to sensitive information.
IIA’s Perspective on Cybersecurity Risks:
IIA Standard 2110 – Governance emphasizes the importance of protecting sensitive data and ensuring compliance with IT security policies.
IIA’s GTAG (Global Technology Audit Guide) on Information Security warns against the dangers of rooted or jailbroken devices, as they compromise cybersecurity defenses.
NIST Cybersecurity Framework and ISO 27001 Information Security Standards identify unauthorized modifications to devices as a critical security risk.
Eliminating Incorrect Options:
B. Eavesdropping: This refers to intercepting communications (e.g., listening in on phone calls or network traffic) but does not involve circumventing administrative restrictions.
C. Man-in-the-Middle (MITM) Attack: This is an attack where an attacker intercepts and alters communication between two parties but does not involve rooting a device.
D. Session Hijacking: This attack involves stealing session tokens to impersonate a user but is unrelated to bypassing security controls on devices.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – Information Security Risks
NIST Cybersecurity Framework
ISO 27001 Information Security Standards
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
Assigning new roles and responsibilities for senior IT management.
Growing use of bring your own devices for organizational matters.
Expansion of operations into new markets with limited IT access.
Hiring new personnel within the IT department for security purposes.
When updating cybersecurity policies, senior management must focus on emerging risks and challenges that impact the organization’s security posture. One major concern is the increasing use of Bring Your Own Device (BYOD) policies, where employees use personal devices for work-related tasks. This introduces security vulnerabilities such as unauthorized access, data leakage, and malware infections.
(A) Incorrect – Assigning new roles and responsibilities for senior IT management.
While defining roles is important, it is a management function rather than a direct cybersecurity policy update.
Cybersecurity policies focus on risks like data protection, access controls, and device security rather than IT management roles.
(B) Correct – Growing use of bring your own devices for organizational matters.
BYOD introduces security risks such as unauthorized access, weak endpoint security, and data loss.
Cybersecurity policies must address encryption, remote access controls, and mobile device management (MDM) solutions.
(C) Incorrect – Expansion of operations into new markets with limited IT access.
While IT expansion poses challenges, cybersecurity policies focus more on data security, threat management, and risk mitigation rather than market access issues.
(D) Incorrect – Hiring new personnel within the IT department for security purposes.
Hiring staff improves security operations but is a resource management decision, not a direct cybersecurity policy concern.
Cybersecurity policies focus on access controls, risk assessments, and compliance requirements.
IIA’s GTAG (Global Technology Audit Guide) – Cybersecurity and Risk Management
Highlights BYOD as a key cybersecurity risk requiring clear policies and controls.
NIST Cybersecurity Framework – Mobile Device Security
Recommends specific policies for managing BYOD risks.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
A company records income from an investment in common stock when it does which of the following?
Purchases bonds.
Receives interest.
Receives dividends
Sells bonds.
When a company invests in common stock, it can earn income in two primary ways:
Dividend income: When the company receives dividends, it recognizes the income.
Capital gains: When the stock is sold for a higher price than its purchase price, it results in a gain.
Why Option C (Receives dividends) is Correct:
Dividends represent income from an investment in common stock when declared and paid by the issuing company.
Under GAAP and IFRS, dividend income is recognized when received, not when declared.
Companies record dividends as investment income in their income statement.
Why Other Options Are Incorrect:
Option A (Purchases bonds):
Incorrect because purchasing bonds is an investment transaction, not income recognition.
Option B (Receives interest):
Incorrect because interest income applies to bond investments, loans, or deposits, not common stock investments.
Option D (Sells bonds):
Incorrect because selling bonds results in capital gains or losses, not regular investment income from common stock.
IIA Practice Guide – "Auditing Investment & Treasury Activities": Discusses the recognition of investment income.
IFRS 9 (Financial Instruments) & GAAP Standards: Provide guidance on recording dividends as investment income.
COSO Internal Control – Integrated Framework: Emphasizes proper financial reporting and income recognition.
IIA References:
Which of the following best describes owner's equity?
Assets minus liabilities.
Total assets.
Total liabilities.
Owners contribution plus drawings.
Owner’s equity represents the residual interest in a company’s assets after deducting liabilities. It is a fundamental concept in financial accounting, reflecting the net worth of a business.
Formula:Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Represents the True Value of Ownership – It measures the owner's claim on the business after settling all obligations.
Directly Tied to the Accounting Equation – Assets=Liabilities+Owner’s Equity\text{Assets} = \text{Liabilities} + \text{Owner’s Equity}Assets=Liabilities+Owner’s Equity Rearranging the equation: Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Commonly Used in Financial Statements – Found in the Balance Sheet under the "Equity" section.
B. Total assets – Incorrect because assets include both owner-financed and liability-financed resources.
C. Total liabilities – Incorrect because liabilities represent debts owed, not ownership value.
D. Owner’s contribution plus drawings – Incorrect because it only considers investments and withdrawals, not retained earnings or net assets.
IIA’s GTAG on Business Financial Management – Discusses financial statement analysis, including owner’s equity.
COSO’s Internal Control – Integrated Framework – Highlights financial reporting accuracy, including equity calculations.
IFRS & GAAP Accounting Standards – Define owner’s equity as assets minus liabilities in financial reporting.
Why Option A is Correct?Why Not the Other Options?IIA References:
An organization that relies heavily on IT wants to contain the impact of potential business disruption to a period of approximately four to seven days. Which of the following
business recovery strategies would most efficiently meet this organization's needs?
A recovery strategy whereby a separate site has not yet been determined, but hardware has been reserved for purchase and data backups.
A recovery strategy whereby a separate site has been secured and is ready for use, with fully configured hardware and real-time synchronized data
A recovery strategy whereby a separate site has been secured and the necessary funds for hardware and data backups have been reserved.
A recovery strategy whereby a separate site has been secured with configurable hardware and data backups.
Business continuity planning (BCP) requires a recovery strategy that minimizes downtime and ensures that critical operations resume within the organization’s desired recovery time objective (RTO).
Since the organization wants to recover within four to seven days, it does not require an expensive real-time recovery site (hot site).
The best strategy is a warm site: a pre-secured location with configurable hardware and data backups that can be activated within the required timeframe.
(A) Incorrect – A recovery strategy whereby a separate site has not yet been determined, but hardware has been reserved for purchase and data backups.
This is a cold site, requiring time for setup and hardware installation.
It does not meet the four to seven-day recovery timeframe efficiently.
(B) Incorrect – A recovery strategy whereby a separate site has been secured and is ready for use, with fully configured hardware and real-time synchronized data.
This describes a hot site, which allows instant failover with real-time synchronization.
While effective, it is costly and unnecessary for a four-to-seven-day recovery target.
(C) Incorrect – A recovery strategy whereby a separate site has been secured and the necessary funds for hardware and data backups have been reserved.
While a site has been secured, the absence of pre-configured hardware would delay recovery, making it an inefficient choice.
(D) Correct – A recovery strategy whereby a separate site has been secured with configurable hardware and data backups.
This describes a warm site, which is the best balance between cost and recovery efficiency.
Configurable hardware and data backups ensure that operations can resume within four to seven days.
IIA’s GTAG (Global Technology Audit Guide) – Business Continuity and IT Disaster Recovery
Recommends warm sites for recovery within a few days.
ISO 22301 – Business Continuity Management Systems
Defines recovery time objectives (RTOs) and site classifications (hot, warm, cold).
COBIT Framework – IT Risk Management
Guides organizations on cost-effective recovery site selection based on risk tolerance.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Requiring users to change their passwords every two years.
Requiring two-step verification for all users
Requiring the use of a virtual private network (VPN) when employees are out of the office.
Requiring the use of up-to-date antivirus, security, and event management tools.
Automated attacks that attempt to exploit weak or leaked passwords—such as credential stuffing, brute force attacks, and dictionary attacks—pose a significant cybersecurity risk. Implementing two-step verification (also known as multi-factor authentication, or MFA) is one of the most effective measures to mitigate these threats.
Why Two-Step Verification is Effective (B - Correct Answer)
Multi-factor authentication (MFA) adds an additional security layer beyond a password, requiring a second factor such as a one-time code sent to a mobile device, biometric authentication, or a security key.
Even if an attacker obtains a password, they cannot access the account without the second authentication factor.
The IIA Global Technology Audit Guide (GTAG) 1: Information Security Management emphasizes the use of multi-factor authentication to prevent unauthorized access.
Why Other Options Are Less Effective:
Option A: Changing passwords every two years
Ineffective because attackers often use compromised credentials that may be recent. Best practices recommend regular password updates but coupled with MFA.
The IIA's GTAG 16: Identity and Access Management highlights that password rotation alone does not fully protect against automated attacks.
Option C: Using a VPN when out of the office
Irrelevant to password attacks. A VPN encrypts data and secures network connections but does not prevent brute force or credential stuffing attacks.
The IIA GTAG 17: Auditing Network Security discusses VPNs for secure remote access but does not consider them a solution for password-based attacks.
Option D: Using antivirus and security tools
While important for overall security, these tools cannot prevent attacks that exploit stolen or weak passwords.
The IIA GTAG 15: Information Security Governance states that security tools should be combined with authentication controls like MFA for best protection.
GTAG 1: Information Security Management – Recommends multi-factor authentication to prevent unauthorized system access.
GTAG 16: Identity and Access Management – Highlights the limitations of password-only security and supports multi-factor authentication.
GTAG 17: Auditing Network Security – Covers VPN usage but does not consider it a solution for password attacks.
GTAG 15: Information Security Governance – Discusses the role of security tools and authentication in securing user accounts.
Step-by-Step Explanation:IIA References for Validation:Thus, requiring two-step verification (B) is the most effective control against automated password attacks.
Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?
Deploys data visualization tool.
Adopt standardized data analysis software.
Define analytics objectives and establish outcomes.
Eliminate duplicate records.
Data cleaning (also called data cleansing or scrubbing) is a critical step in data analytics to ensure accuracy, consistency, and reliability. Removing duplicate records is a key data cleaning technique that improves data quality.
Improves Data Integrity – Prevents misleading results caused by duplicate values.
Enhances Data Accuracy – Ensures that analytics are based on unique and valid information.
Optimizes Performance – Reduces redundancy, improving processing speed and efficiency.
Prevents Reporting Errors – Ensures accurate insights for decision-making.
A. Deploys data visualization tool – Visualization tools help interpret data but do not clean it.
B. Adopt standardized data analysis software – Software tools support analysis but do not eliminate duplicate records automatically.
C. Define analytics objectives and establish outcomes – This step is important for analysis strategy, but it does not clean data.
IIA’s GTAG on Data Analytics – Emphasizes the importance of data cleansing in ensuring reliable analytics.
COBIT 2019 (Data Management Framework) – Highlights duplicate removal as a best practice in data governance.
ISO 8000-110 (Data Quality Standard) – Recommends eliminating duplicate records for high-quality analytics.
Why Eliminating Duplicate Records is the Correct Answer?Why Not the Other Options?IIA References:✅ Final Answer: D. Eliminate duplicate records.
According to 11A guidance on it; which of the following statements is true regarding websites used in e-commerce transactions?
HTTP sites provide sufficient security to protect customers' credit card information.
Web servers store credit cardholders' information submitted for payment.
Database servers send cardholders’ information for authorization in clear text.
Payment gatewaysauthorizecredit cardonlinepayments.
E-commerce transactions involve multiple security layers to ensure the protection of customers' sensitive financial information. The correct answer is D, as payment gateways serve as intermediaries that authorize online credit card transactions by securely transmitting the payment details to the bank or card networks for approval. Let’s examine each option carefully:
Option A: HTTP sites provide sufficient security to protect customers' credit card information.
Incorrect. HyperText Transfer Protocol (HTTP) does not provide encryption, meaning that data transmitted over an HTTP connection can be intercepted by malicious actors. Instead, Secure HTTP (HTTPS), which uses Secure Sockets Layer (SSL) or Transport Layer Security (TLS), is required to encrypt the data.
IIA Reference: Internal auditors evaluating e-commerce security should verify that organizations use HTTPS for secure transactions. (IIA GTAG: Information Security Governance)
Option B: Web servers store credit cardholders' information submitted for payment.
Incorrect. While web servers may temporarily process customer data, they should not store sensitive credit card information due to security risks. Instead, organizations follow the Payment Card Industry Data Security Standard (PCI DSS), which mandates secure storage and encryption protocols.
IIA Reference: IIA Standards recommend compliance with PCI DSS to protect sensitive payment information. (IIA Practice Guide: Auditing IT Governance)
Option C: Database servers send cardholders’ information for authorization in clear text.
Incorrect. Transmitting cardholder data in clear text is a severe security vulnerability. Secure encryption protocols such as SSL/TLS or tokenization must be used to protect data in transit.
IIA Reference: Internal auditors should ensure encryption measures are in place for financial transactions. (IIA GTAG: Auditing Cybersecurity Risk)
Option D: Payment gateways authorize credit card online payments.
Correct. Payment gateways act as secure intermediaries between merchants and payment processors, verifying the transaction details before authorization. This ensures a secure transaction by encrypting sensitive data before transmitting it for approval.
IIA Reference: IIA guidance on IT controls emphasizes the importance of secure payment processing through payment gateways. (IIA GTAG: Managing and Auditing IT Vulnerabilities)
Which of the following IT layers would require the organization to maintain communication with a vendor in a tightly controlled and monitored manner?
Applications
Technical infrastructure.
External connections.
IT management
Organizations that rely on third-party vendors for IT services must ensure secure and controlled communication, especially in areas where external connections are involved. External connections typically include:
Cloud services (e.g., SaaS, PaaS, IaaS)
Third-party APIs
Remote access (VPNs, firewalls, network gateways)
IoT devices and external sensors
These connections introduce cybersecurity risks, requiring continuous monitoring, vendor communication, and security controls.
(A) Applications.
Incorrect. While application security is important, it is typically managed internally. Vendor involvement is needed for software patches and updates, but communication is not as tightly monitored.
(B) Technical infrastructure.
Incorrect. This layer includes internal IT components like servers, databases, and networks, which are mostly managed in-house. Vendor involvement is required for hardware/software updates but not to the same extent as external connections.
(C) External connections. ✅
Correct. External connections require tightly controlled communication with vendors to prevent security breaches, unauthorized access, and data leaks.
IIA GTAG "Auditing IT Governance" highlights third-party risk management as a key area for IT audits.
IIA Standard 2110 requires organizations to establish governance structures for vendor and IT security management.
(D) IT management.
Incorrect. IT management focuses on internal oversight of IT policies and compliance, but does not necessarily require tightly controlled vendor communication.
IIA GTAG – "Auditing IT Governance"
IIA GTAG – "Managing Third-Party Risks"
IIA Standard 2110 – Governance
Analysis of Answer Choices:IIA References:
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
Draft separate audit reports for business and IT management.
Conned IT audit findings to business issues.
Include technical details to support IT issues.
Include an opinion on financial reporting accuracy and completeness.
When reporting internal audit findings related to Enterprise Resource Planning (ERP) systems, IT audit findings must be relevant to business objectives. Business leaders may not fully understand technical IT risks, so reports should translate IT risks into business impacts to ensure actionable decision-making.
(A) Draft separate audit reports for business and IT management.
Incorrect: Fragmenting reports could create misalignment, reducing the effectiveness of integrated risk management.
(B) Connect IT audit findings to business issues. (Correct Answer)
IT auditors should explain how IT risks impact operations, financial reporting, and strategic goals.
IIA Standard 2410 – Criteria for Communicating requires audit findings to be clear, relevant, and actionable for all stakeholders.
IIA GTAG 8 – Auditing Application Controls emphasizes aligning IT controls with business risks.
(C) Include technical details to support IT issues.
Incorrect: While technical details help IT teams, business executives need risk-based insights, not just technical specifics.
(D) Include an opinion on financial reporting accuracy and completeness.
Incorrect: While ERP systems impact financial data, IT auditors should focus on system risks, not directly on financial reporting opinions (which is the role of financial auditors).
IIA Standard 2410 – Criteria for Communicating: Requires clear and business-relevant communication of audit findings.
IIA GTAG 8 – Auditing Application Controls: Advises IT auditors to relate technical risks to business objectives.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because IT audit findings should be framed in a way that connects technical risks to business implications, making them more relevant to management.
What is the primary risk associated with an organization adopting a decentralized structure?
Inability to adapt.
Greater costs of control function.
Inconsistency in decision making.
Lack of resilience.
A decentralized structure distributes decision-making authority across different business units, divisions, or geographical locations. While decentralization provides flexibility and autonomy, the primary risk is inconsistency in decision-making, as different units may develop their own policies, processes, and priorities that are not aligned with the organization's strategic goals.
(A) Inability to adapt.
Incorrect. Decentralization typically enhances adaptability, as individual units can quickly respond to local market conditions, customer needs, and emerging risks without waiting for corporate approval.
(B) Greater costs of control function.
Partially correct but not the primary risk. While decentralization may increase oversight costs (e.g., more auditors and compliance personnel), the primary issue is lack of uniform decision-making rather than costs alone.
(C) Inconsistency in decision making. ✅
Correct. When decision-making authority is spread across various units, inconsistencies arise in areas such as risk management, compliance, operational procedures, and resource allocation. This can lead to conflicts, inefficiencies, and misalignment with corporate strategy.
IIA Standard 2120 – Risk Management emphasizes the need for consistent risk oversight in all business units.
IIA GTAG "Auditing the Control Environment" warns that inconsistent policies weaken internal controls and governance.
(D) Lack of resilience.
Incorrect. A decentralized structure often improves resilience because decision-making is spread out, reducing dependency on a central authority. This allows units to function independently if one area experiences disruption.
IIA Standard 2120 – Risk Management
IIA GTAG – "Auditing the Control Environment"
COSO Framework – Internal Control Principles
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as decentralization introduces decision-making inconsistencies, affecting governance and strategic alignment.
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and
telecommunications, but does not have servers or infrastructure equipment?
Frozen site
Cold site
Warm site
Hot site
An IT disaster recovery plan (DRP) ensures business continuity by defining backup and recovery sites. These sites differ based on their level of readiness.
Let’s analyze the answer choices:
Option A: Frozen site
Incorrect. "Frozen site" is not a recognized term in IT disaster recovery planning. The three common categories are cold, warm, and hot sites.
Option B: Cold site
Correct.
A cold site is a designated recovery location that provides only basic facilities such as power, space, internet, and telecommunications.
It does not include servers, infrastructure, or pre-installed systems, meaning that it requires significant setup time before becoming operational.
IIA Reference: Business continuity and IT risk management frameworks classify cold sites as a cost-effective but slower disaster recovery option. (IIA GTAG: Business Continuity Management)
Option C: Warm site
Incorrect. A warm site includes some pre-installed hardware and software, allowing faster recovery compared to a cold site.
Option D: Hot site
Incorrect. A hot site is fully operational with real-time data replication, enabling an immediate switchover in case of disaster.
An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?
he organization's operating expenses are increasing.
The organization has adopted just-in-time inventory.
The organization is experiencing inventory theft.
The organization's inventory is overstated.
A declining inventory turnover combined with an increasing gross margin rate suggests that the organization is not selling inventory as quickly as before, but still reporting higher profitability. This can indicate overstated inventory values, meaning that financial statements show higher inventory balances than what actually exists.
(A) Incorrect – The organization’s operating expenses are increasing.
Operating expenses do not directly affect inventory turnover, which measures how quickly inventory is sold.
Higher expenses could reduce net profit, but they would not explain a higher gross margin.
(B) Incorrect – The organization has adopted just-in-time (JIT) inventory.
JIT inventory systems increase inventory turnover by reducing excess stock.
Since turnover is declining, this suggests the opposite of JIT.
(C) Incorrect – The organization is experiencing inventory theft.
Inventory theft usually reduces inventory levels, potentially increasing inventory turnover due to lower stock.
Theft could lower gross margins if significant losses occur.
(D) Correct – The organization’s inventory is overstated.
Overstated inventory leads to lower COGS, artificially inflating gross margin.
If inventory levels are inflated, turnover appears lower because reported inventory is higher than actual sales justify.
IIA’s Global Internal Audit Standards – Financial Statement Audits and Fraud Risk
Covers risks related to inventory misstatements and financial fraud.
IFRS & GAAP Accounting Standards – Inventory Valuation
Defines how inventory overstatement impacts financial ratios.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following is most influenced by a retained earnings policy?
Cash.
Dividends.
Gross margin.
Net income.
A retained earnings policy determines how much of a company’s net income is retained (kept in the business) versus distributed to shareholders as dividends.
(A) Cash.
Incorrect: While retained earnings affect the company’s financial position, they do not directly impact cash flow, as retained earnings can be reinvested in non-cash assets.
(B) Dividends. (Correct Answer)
A retained earnings policy directly influences dividend payouts.
More retained earnings = lower dividends; less retained earnings = higher dividends.
IIA Standard 2110 (Governance) requires oversight of dividend policies as part of corporate governance.
COSO ERM – Risk Response suggests that dividend policies should align with strategic financial goals.
(C) Gross margin.
Incorrect: Gross margin is determined by revenue and cost of goods sold (COGS), not retained earnings.
(D) Net income.
Incorrect: Net income is calculated before retained earnings are determined, so the policy does not influence net income directly.
IIA Standard 2110 – Governance: Covers policies impacting financial distributions.
COSO ERM – Risk Response: Suggests that retained earnings policies influence financial stability and investor decisions.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because a retained earnings policy primarily affects the amount of dividends paid to shareholders.
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?
It should be reported as an administrative expense on the income statement.
It should be reported as period cost other than a product cost on the management accounts
It should be reported as cost of goods sold on the income statement.
It should be reported on the balance sheet as part of inventory.
Indirect labor costs incurred in the production process are treated as part of manufacturing overhead. Since the cost was incurred on the last day of the year, it is likely that the related products are still in inventory rather than being sold.
Under Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS), indirect labor costs associated with manufacturing should be included in the cost of inventory until the related goods are sold.
Once the goods are sold, the cost will be transferred to the cost of goods sold (COGS) in the income statement.
A. It should be reported as an administrative expense on the income statement. (Incorrect)
Indirect labor related to manufacturing is classified as part of manufacturing overhead, not an administrative expense.
B. It should be reported as a period cost other than a product cost on the management accounts. (Incorrect)
Indirect labor in production is a product cost (i.e., a cost that is included in inventory and matched with revenues when the product is sold).
Period costs refer to expenses like selling and administrative costs, which are expensed immediately.
C. It should be reported as cost of goods sold on the income statement. (Incorrect)
Since the cost was incurred on the last day of the year, the related products have likely not yet been sold, meaning the cost remains in inventory.
D. It should be reported on the balance sheet as part of inventory. (Correct)
Manufacturing overhead, including indirect labor, is included in inventory (work-in-process or finished goods) on the balance sheet until the goods are sold.
IIA Practice Guide: Auditing Inventory Management emphasizes that manufacturing costs, including indirect labor, should be allocated properly to inventory.
IIA Standard 2330 – Documenting Information requires auditors to ensure proper financial reporting of costs in accordance with GAAP/IFRS inventory valuation principles.
IFRS (IAS 2 – Inventories) and GAAP (ASC 330 – Inventory) state that indirect production costs must be capitalized as inventory until sold.
Explanation of Answer Choices:IIA References:Thus, the correct answer is D. It should be reported on the balance sheet as part of inventory.
Which of the following physical security controls is able to serve as both a detective and preventive control?
Authentication logs.
Card key readers.
Biometric devices
Video surveillance.
If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?
Settlement of short-term obligations may become difficult.
Cash may be bed up in items not generating financial value.
Collection policies of the organization are ineffective.
The organization is efficient in using assets to generate revenue.
Working capital = Current Assets – Current Liabilities
A high amount of working capital compared to industry averages suggests that the organization may not be efficiently using its resources. This could mean that:
Excess cash is invested in inventory or accounts receivable, instead of being used for growth, investment, or shareholder returns.
The company may be holding too much inventory, which could lead to obsolescence or additional storage costs.
The business may have slow turnover in receivables, meaning cash is not being collected efficiently.
A. Settlement of short-term obligations may become difficult. (Incorrect)
A high working capital means the organization has sufficient assets to cover short-term obligations, so liquidity issues are unlikely.
B. Cash may be tied up in items not generating financial value. (Correct)
High working capital may indicate inefficient use of assets, such as excess inventory, high accounts receivable, or idle cash.
This can negatively impact return on assets (ROA) and overall financial performance.
C. Collection policies of the organization are ineffective. (Incorrect)
While high receivables can be a factor, working capital includes all current assets and liabilities, not just accounts receivable.
The issue could be inventory mismanagement or excess liquidity, not just collection policies.
D. The organization is efficient in using assets to generate revenue. (Incorrect)
A high working capital does not necessarily mean efficiency. In fact, it may indicate underutilized resources rather than optimized performance.
IIA GTAG 3 – Continuous Auditing: Implications for Internal Auditors highlights the importance of monitoring key financial metrics such as working capital.
IIA Practice Advisory 2130-1 – Assessing Organizational Performance emphasizes that internal auditors should assess whether financial resources are being used efficiently.
Financial Management Principles (IIA Guidance) discuss the impact of excessive working capital on liquidity and return on investment.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. Cash may be tied up in items not generating financial value.
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
Monitoring network traffic.
Using whitelists and blacklists to manage network traffic.
Restricting access and blocking unauthorized access to the network
Educating employees throughout the company to recognize phishing attacks.
This attack was caused by a phishing email containing malware embedded in an Excel spreadsheet. The most effective way to prevent such attacks is employee awareness training, as human error is the leading cause of successful phishing attempts.
Understanding Phishing Attacks:
Phishing emails trick employees into opening malicious links or attachments, leading to malware infections and data breaches.
Cybercriminals often disguise emails as coming from trusted vendors or colleagues.
Why Employee Training is the Most Effective Control:
Employees must be trained to identify suspicious emails, attachments, and links.
Training reduces the likelihood of employees accidentally opening malicious files.
Many cybersecurity frameworks (e.g., NIST, ISO 27001, and CIS) emphasize employee awareness as the first line of defense.
Why the Other Options Are Less Effective Alone:
A. Monitoring network traffic. ❌
Can detect unusual activity after an attack but does not prevent phishing attempts.
B. Using whitelists and blacklists to manage network traffic. ❌
Helps filter harmful websites, but phishing emails often appear legitimate and may bypass filters.
C. Restricting access and blocking unauthorized access to the network. ❌
Helps limit damage after malware enters the network but does not stop employees from opening phishing emails.
IIA GTAG (Global Technology Audit Guide) on Cybersecurity: Recommends employee awareness programs as a key control.
IIA Standard 2110 (Governance): Internal auditors should assess cybersecurity training programs.
NIST Cybersecurity Framework – PR.AT (Protect – Awareness and Training): Emphasizes the role of employee education in preventing cyber threats.
ISO/IEC 27001 – Security Awareness and Training (A.7.2.2): Requires organizations to implement cybersecurity awareness programs.
Step-by-Step Justification:IIA References:Thus, the correct answer is D. Educating employees throughout the company to recognize phishing attacks. ✅
According to IIA guidance, which of the following statements is true regarding penetration testing?
Testing should not be announced to anyone within the organization to solicit a real-life response.
Testing should take place during heavy operational time periods to test system resilience.
Testing should be wide in scope and primarily address detective management controls for identifying potential attacks.
Testing should address the preventive controls and management's response.
Penetration testing is a security practice used to identify vulnerabilities in an organization's information systems by simulating cyberattacks. It is an essential component of IT risk management and internal auditing under The Institute of Internal Auditors (IIA) standards, particularly in the context of IT governance, cybersecurity risk management, and control assurance.
Focus on Preventive Controls:
Penetration testing evaluates how well preventive controls (e.g., firewalls, encryption, authentication mechanisms) work against potential cyberattacks.
According to the IIA Global Technology Audit Guide (GTAG) 11: Developing an IT Audit Plan, testing should emphasize preventive security measures to minimize risks.
Management’s Response Assessment:
The effectiveness of an organization's incident response plan is also evaluated.
Management's reaction to simulated cyber threats ensures that detection and response mechanisms are functional and aligned with IIA Standard 2120 – Risk Management and IIA GTAG 1: Information Security Governance.
A. Testing should not be announced to anyone within the organization to solicit a real-life response. (Incorrect)
Reason: While unannounced tests (e.g., red team exercises) can provide real-world insights, penetration testing should be coordinated with IT and security personnel.
IIA GTAG 11 emphasizes structured and ethical testing approaches, ensuring that necessary stakeholders are informed to prevent operational disruptions.
B. Testing should take place during heavy operational time periods to test system resilience. (Incorrect)
Reason: While resilience testing is important, penetration testing is typically performed in controlled conditions to avoid disrupting business operations.
IIA Standard 2130 – Control supports minimizing business risks during testing.
C. Testing should be wide in scope and primarily address detective management controls for identifying potential attacks. (Incorrect)
Reason: While detection controls (e.g., intrusion detection systems) are important, penetration testing focuses primarily on preventive controls.
IIA GTAG 1 and IIA GTAG 11 stress proactive security strategies over purely detective measures.
IIA Global Technology Audit Guide (GTAG) 11: Developing an IT Audit Plan – Covers IT security testing, including penetration testing.
IIA GTAG 1: Information Security Governance – Emphasizes the role of security assessments.
IIA Standard 2120 – Risk Management – Highlights the importance of testing preventive security measures.
IIA Standard 2130 – Control – Discusses ensuring operational effectiveness during testing.
Explanation of the Correct Answer (D):Analysis of Incorrect Answers:IIA References:Thus, D is the most accurate choice as per IIA guidance.
Which of the following analytical techniques would an internal auditor use to verify that none of an organization's employees are receiving fraudulent invoice payments?
Perform gap testing.
Join different data sources.
Perform duplicate testing.
Calculate statistical parameters.
Duplicate testing is an analytical technique used to detect fraudulent payments, errors, or inefficiencies by identifying repeated transactions within financial records. In this case, an internal auditor would use duplicate testing to ensure that employees are not receiving fraudulent invoice payments by verifying that no invoice has been paid multiple times.
Detecting Duplicate Payments: Fraudulent employees may submit the same invoice multiple times with slight modifications to avoid detection. Duplicate testing helps find identical or similar transactions.
Identifying Unusual Patterns: By analyzing payment records, auditors can detect repeat payments to the same vendor, same invoice number, or similar amounts within a short time frame.
Aligns with Fraud Prevention Practices: As per IIA Standard 2120 - Risk Management, internal auditors must identify and assess fraud risks, including duplicate invoice payments.
Supports Data Analytics in Auditing: IIA GTAG (Global Technology Audit Guide) 16 - Data Analysis Techniques recommends using duplicate testing to identify fraud, control weaknesses, and errors in financial transactions.
A. Perform gap testing: Gap testing is used to identify missing data or transactions in a sequence (e.g., missing invoice numbers), but it does not specifically target duplicate or fraudulent payments.
B. Join different data sources: This method is useful for cross-checking information across multiple databases, but it is not directly related to identifying duplicate invoice payments.
D. Calculate statistical parameters: Statistical analysis provides summary insights about data (e.g., mean, median), but it does not specifically detect duplicate payments.
IIA Standard 2120 - Risk Management: Internal auditors must evaluate fraud risks, including duplicate payments.
IIA Standard 1220 - Due Professional Care: Requires auditors to apply appropriate data analytics techniques.
IIA GTAG 16 - Data Analysis Techniques: Recommends duplicate testing as an effective fraud detection method.
Key Reasons Why Option C is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is C. Perform duplicate testing.
What security feature would Identity a legitimate employee using her own smart device to gam access to an application run by the organization?
Using a jailbroken or rooted smart device feature.
Using only smart devices previously approved by the organization.
Obtaining written assurance from the employee that security policies and procedures are followed.
Introducing a security question known only by the employee.
To ensure security when employees use their own smart devices to access organizational applications, the best approach is to allow only pre-approved devices that meet the organization’s security standards.
Device Security & Compliance: Approved devices are verified for security measures like encryption, mobile device management (MDM), and antivirus protection.
Risk Management: Restricting access to pre-approved devices reduces the risk of malware, unauthorized access, and vulnerabilities.
IT Control & Monitoring: IT can enforce security updates, compliance policies, and access control mechanisms on pre-approved devices.
Option A (Using a jailbroken or rooted smart device feature): Jailbroken or rooted devices remove security protections and create severe security vulnerabilities.
Option C (Obtaining written assurance from the employee that security policies and procedures are followed): Written assurances alone are not a security measure; technical controls must be enforced.
Option D (Introducing a security question known only by the employee): Security questions are weak authentication measures and do not verify the legitimacy of a device.
IIA's GTAG on Information Security Management stresses the importance of device security and requiring IT-approved devices.
NIST Special Publication 800-124 (referenced in IIA’s IT Audit Guidance) highlights best practices for securing mobile devices in an enterprise setting, recommending pre-approved devices.
Why Option B is Correct:Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is B. Using only smart devices previously approved by the organization.
Which of the following is true of bond financing, compared to common stock, when alJ other variables are equal?
Lower shareholder control
lower indebtedness
Higher company earnings per share.
Higher overall company earnings
When a company finances through bonds (debt) instead of issuing common stock (equity), it increases earnings per share (EPS) because bond financing does not dilute ownership, whereas issuing new stock does.
Impact on Earnings Per Share (EPS):
EPS formula: EPS=Net Income−Preferred DividendsNumber of Outstanding Shares\text{EPS} = \frac{\text{Net Income} - \text{Preferred Dividends}}{\text{Number of Outstanding Shares}}EPS=Number of Outstanding SharesNet Income−Preferred Dividends
Since bond financing does not increase the number of shares outstanding, net income is distributed among fewer shareholders, increasing EPS.
If the company issues more stock instead of bonds, EPS decreases because the same earnings are divided among more shares.
Why Bond Financing Affects EPS Favorably:
Interest on bonds is tax-deductible, reducing taxable income and increasing net profits.
Unlike dividends, which are paid on common stock and reduce retained earnings, bondholders receive fixed interest payments that do not dilute equity ownership.
A. Lower shareholder control: ❌
Bondholders do not get voting rights, whereas issuing more stock reduces existing shareholders’ control.
This statement would be true for stock financing, not bond financing.
B. Lower indebtedness: ❌
Bonds increase a company’s debt obligations, not reduce them.
If a company uses stock financing instead of bonds, it avoids taking on debt.
D. Higher overall company earnings: ❌
While bonds increase EPS, they do not necessarily increase total earnings.
The company must pay interest on bonds, which could reduce net income if not managed properly.
IIA Standard 2110 (Governance): Ensures management selects financing strategies that align with financial stability.
COSO ERM Framework – Financial Risk Management: Evaluates how financing choices impact shareholder value and risk exposure.
IFRS & GAAP Accounting Standards on Debt vs. Equity Financing: Explain how bond financing increases EPS compared to issuing new shares.
Step-by-Step Justification:Why Not the Other Options?IIA References:
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
Collections from customers
Sale of securities.
Purchase of trucks.
Payment of debt, including interest
Understanding the Financing Section of a Cash Budget:
A cash budget is a financial plan that outlines expected cash inflows and outflows over a specific period.
The financing section records activities related to borrowing, repaying debt, issuing securities, and managing interest payments.
Why Debt and Interest Payments Belong in the Financing Section:
Debt repayment (principal and interest) is a financial activity rather than an operational or investing activity.
Companies must plan for financing costs to ensure liquidity and compliance with loan agreements.
Why Other Options Are Incorrect:
A. Collections from customers – Incorrect.
Customer payments belong in the operating section of the cash budget, as they represent core business activities.
B. Sale of securities – Incorrect.
The sale of securities is an investing activity unless related to issuing new debt or equity.
C. Purchase of trucks – Incorrect.
Buying trucks is a capital expenditure, which belongs in the investing section of the cash budget.
IIA’s Perspective on Financial Planning and Budgeting:
IIA Standard 2120 – Risk Management requires organizations to assess financial risks, including debt repayment obligations.
COSO ERM Framework highlights the importance of cash flow forecasting to maintain financial stability.
GAAP and IFRS Financial Reporting Standards classify debt repayment and interest under financing activities.
IIA References:
IIA Standard 2120 – Risk Management & Cash Flow Oversight
COSO ERM – Financial Planning and Liquidity Management
GAAP & IFRS – Cash Flow Statement Classifications
Thus, the correct and verified answer is D. Payment of debt, including interest.
The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?
Commissions.
Stock options
Gain-sharing bonuses.
Allowances
The best method of compensation to align senior management incentives with the long-term health of the organization is stock options. Stock options encourage executives to focus on sustained growth and profitability rather than short-term gains, ensuring that their interests align with those of shareholders and stakeholders.
Long-Term Value Creation:
Stock options reward executives only if the company’s stock price appreciates over time.
This encourages leadership to focus on long-term profitability, operational efficiency, and sustainability.
Alignment with Shareholder Interests:
If the company performs well, stock prices rise, benefiting both shareholders and executives.
Poor decision-making that harms long-term value results in devalued stock options, discouraging risky short-term strategies.
Retention of Key Executives:
Stock options typically have a vesting period (e.g., 3-5 years), which helps retain top management and ensures commitment to long-term objectives.
Risk Management Considerations:
Unlike cash bonuses or short-term commissions, stock options require executives to consider risks and ethical decision-making over an extended period.
This supports the governance principles outlined by IIA’s International Standards for the Professional Practice of Internal Auditing (IPPF) – Standard 2110 (Governance), which emphasizes aligning incentives with risk tolerance and long-term objectives.
A. Commissions: These are typically tied to short-term sales performance rather than long-term strategic success.
C. Gain-sharing bonuses: These provide short-term financial rewards based on operational performance but do not incentivize sustained value creation.
D. Allowances: Fixed allowances do not fluctuate based on company performance and do not drive long-term strategic focus.
IIA Standard 2110 – Governance: Ensures that management incentives align with the organization's mission and risk tolerance.
IIA Practice Guide: Evaluating Corporate Governance: Emphasizes long-term incentive structures such as stock options to promote sustainable decision-making.
COSO Enterprise Risk Management (ERM) Framework: Highlights how executive compensation should support long-term organizational strategy.
Step-by-Step Justification:Why Not the Other Options?IIA References:
Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?
Analysis of the full population of existing data.
Verification of the completeness and integrity of existing data.
Continuous monitoring on a repetitive basis.
Analysis of the databases of partners, such as suppliers.
To identify very small control and transaction anomalies, internal auditors should analyze the entire dataset rather than a sample. Full population analysis increases the likelihood of detecting:
Unusual transaction patterns, including fraud, errors, and control weaknesses.
Rare or subtle anomalies that might be missed in sampling-based audits.
Machine-learning-based fraud detection and exception analysis.
A. Analysis of the full population of existing data. (Correct)
This approach ensures complete coverage, reduces sampling risk, and detects rare anomalies.
Modern data analytics tools allow auditors to analyze entire datasets efficiently.
B. Verification of the completeness and integrity of existing data. (Incorrect)
While data integrity checks ensure reliable data, they do not actively identify anomalies or suspicious patterns.
C. Continuous monitoring on a repetitive basis. (Incorrect, but relevant)
Continuous monitoring is useful for ongoing fraud detection, but it does not guarantee full anomaly detection unless it covers all transactions.
Full population analysis is more comprehensive for identifying small anomalies.
D. Analysis of the databases of partners, such as suppliers. (Incorrect)
While analyzing external data sources can uncover vendor fraud, it does not address internal control or transaction anomalies within the organization.
IIA GTAG 3 – Continuous Auditing recommends full population analysis as a best practice for anomaly detection.
IIA Standard 1220 – Due Professional Care requires auditors to use advanced analytical techniques to detect control weaknesses.
COSO Framework – Fraud Risk Management Guide suggests full transaction data analysis for effective fraud detection.
Explanation of Answer Choices:IIA References:Thus, the correct answer is A. Analysis of the full population of existing data.
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?
Inventory of information assets
Limited sharing of data files with external parties.
Vulnerability assessment
Clearly defined policies
Strong Security Governance Requires Well-Defined Policies:
Cybersecurity governance is built upon clear, documented, and enforceable security policies that outline expectations, roles, responsibilities, and processes.
Policies define acceptable behaviors, security controls, incident response, and compliance requirements.
IIA Standard 2110 - Governance: Requires organizations to establish effective IT security governance, including policies that address cybersecurity risks.
IIA GTAG (Global Technology Audit Guide) on Information Security Governance:
Recommends that clear policies should guide security controls, user access, and incident response to address cybersecurity threats.
A. Inventory of information assets (Incorrect)
While identifying critical information assets is essential for risk management, it does not constitute security governance on its own.
Asset inventories support governance but must be reinforced by policies that define how data should be protected.
B. Limited sharing of data files with external parties (Incorrect)
Restricting data sharing is a control measure, not a governance principle.
Policies define when, how, and under what conditions data can be shared securely.
C. Vulnerability assessment (Incorrect)
Assessments help identify security gaps but do not establish governance.
Effective governance ensures that vulnerabilities are identified, prioritized, and remediated in accordance with policies.
Explanation of Answer Choice D (Correct Answer):Explanation of Incorrect Answers:Conclusion:To ensure strong security governance, organizations must have clearly defined security policies (Option D) as a foundation for managing cybersecurity threats.
IIA References:
IIA Standard 2110 - Governance
IIA GTAG - Information Security Governance
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?
Reviewing the customer's wire activity to determine whether the request is typical.
Calling the customer at the phone number on record to validate the request.
Replying to the customer via email to validate the sender and request.
Reviewing the customer record to verify whether the customer has authorized wire requests from that email address.
Phishing attacks often target financial institutions by impersonating customers and requesting fraudulent fund transfers. The best way to verify such requests is to independently contact the customer using a trusted communication channel, such as the phone number on record.
Verbal confirmation via a trusted number prevents fraudsters from exploiting email spoofing or compromised accounts.
This aligns with industry best practices, including multi-factor verification for high-risk transactions.
A. Reviewing the customer's wire activity to determine whether the request is typical. (Incorrect)
While reviewing transaction history can help detect anomalies, fraudsters can mimic previous transaction patterns, making this method unreliable on its own.
B. Calling the customer at the phone number on record to validate the request. (Correct)
Direct phone verification ensures that the actual account owner is making the request.
This is a widely recommended anti-fraud measure in financial institutions.
C. Replying to the customer via email to validate the sender and request. (Incorrect)
If the email account is compromised, the fraudster will control the response.
Email validation is not secure for financial transactions.
D. Reviewing the customer record to verify whether the customer has authorized wire requests from that email address. (Incorrect)
While this can help identify unregistered emails, attackers often spoof or hack real customer emails.
Email-based verification alone is not sufficient.
IIA GTAG 16 – Security Risk: IT and Cybersecurity recommends multi-factor authentication for high-risk financial transactions.
IIA Standard 2120 – Risk Management highlights the need for robust fraud prevention mechanisms, including direct customer verification.
FFIEC (Federal Financial Institutions Examination Council) Cybersecurity Guidelines emphasize the importance of out-of-band authentication for wire transfers.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. Calling the customer at the phone number on record to validate the request.
An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?
Boundary attack.
Spear phishing attack.
Brute force attack.
Spoofing attack.
A spear phishing attack is a highly targeted email-based attack where an attacker impersonates a trusted individual (e.g., the CEO) to trick recipients into providing sensitive information.
In this scenario, an intruder posed as the CEO and deceived payroll staff into sharing employees' private tax information.
Spear phishing is more targeted than general phishing, often using personal details to make the fraudulent request seem legitimate.
A. Boundary attack. (Incorrect)
A boundary attack refers to attempts to breach an organization’s network perimeter defenses, such as firewalls and intrusion detection systems.
This scenario describes a social engineering attack, not a technical boundary attack.
B. Spear phishing attack. (Correct)
Spear phishing attacks are highly personalized email attacks, usually targeting specific employees within an organization.
Attackers research their targets and use realistic messages to trick them into divulging sensitive data.
This fits the scenario, as the attacker impersonated the CEO to steal tax information.
C. Brute force attack. (Incorrect)
A brute force attack involves systematically guessing passwords to gain unauthorized access to systems.
This attack was based on deception, not password cracking.
D. Spoofing attack. (Incorrect, but closely related)
Email spoofing is a technique where an attacker falsifies the sender’s email address.
While spear phishing often includes spoofing, the broader technique used here is spear phishing, as it involved social engineering and deception.
IIA GTAG 16 – Security Risk: IT and Cybersecurity discusses phishing and social engineering threats, emphasizing internal controls to mitigate them.
IIA Standard 2120 – Risk Management highlights the need for risk assessments in cybersecurity, including employee awareness training for phishing attacks.
National Institute of Standards and Technology (NIST) Special Publication 800-61 classifies spear phishing as a high-risk cyber threat to organizations.
Explanation of Answer Choices:IIA References:
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?
A value-added network.
A local area network.
A metropolitan area network.
A wide area network.
A Value-Added Network (VAN) is a private, third-party managed network that provides secure electronic data interchange (EDI) and other communication services between business partners. VANs offer enhanced security, reliability, and efficiency in transmitting business-critical data, making them ideal for companies engaged in manufacturing and distribution that require secure and structured communication channels with trading partners.
Secure Network for Business Partners: The scenario describes a network that facilitates EDI between a company and its trading partners. A VAN specializes in providing secure and structured business communications.
Enhanced Efficiency and Customer Service: VANs streamline business operations by reducing transaction errors, improving order fulfillment, and increasing operational efficiencies.
Third-Party Management: Unlike traditional internal networks, VANs are managed by external service providers that offer additional security, compliance, and encryption measures.
Alignment with Internal Auditing Standards: The IIA emphasizes the importance of secure and reliable communication networks in governance, risk management, and internal controls. Secure data exchanges through a VAN mitigate risks associated with unauthorized access and data breaches.
B. A Local Area Network (LAN): LANs are confined to a limited geographical area, such as an office or a factory, and are used for internal communication rather than secure external partner communication.
C. A Metropolitan Area Network (MAN): MANs connect multiple LANs within a city or a metropolitan region but are not specifically designed for business-to-business data exchange.
D. A Wide Area Network (WAN): While WANs connect geographically dispersed networks, they do not inherently provide the secure, structured EDI services that a VAN does.
IIA Standard 2110 - Governance: Emphasizes the importance of IT governance and secure communication channels in protecting business data.
IIA Standard 2120 - Risk Management: Highlights the need for secure data transmission to mitigate cyber risks.
IIA Standard 2201 - Planning the Engagement: Requires auditors to assess IT infrastructure, including networks used for business operations.
COBIT Framework (Control Objectives for Information and Related Technologies): Supports the use of secure, managed networks like VANs for business data exchange.
Key Reasons Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. A Value-Added Network (VAN).
An organization selected a differentiation strategy to compete at the business level. Which of the following structures best fits this strategic choice?
Functional structure.
Divisional structure.
Mechanistic structure.
Functional structure with cross-functional teams.
A differentiation strategy focuses on creating unique products or services to stand out from competitors. This strategy requires a flexible, decentralized structure that encourages innovation and market responsiveness, which is best achieved through a divisional structure.
Divisional Structure Supports Differentiation:
A divisional structure organizes the company into semi-autonomous business units, each focusing on a specific product, market, or geographic area.
This allows businesses to adapt strategies based on customer needs and competitive positioning.
Enhances Responsiveness and Innovation:
Each division operates independently, making quicker decisions that align with the differentiation strategy.
Fits Competitive Strategies:
Companies using differentiation need flexibility and customer focus, which a divisional structure provides better than rigid structures.
A. Functional structure:
Functional structures group employees by departments (e.g., finance, marketing) and are more suited for cost-leadership strategies, not differentiation.
C. Mechanistic structure:
A mechanistic structure is highly centralized and rigid, making it incompatible with innovation and differentiation.
D. Functional structure with cross-functional teams:
While this adds flexibility, it does not provide the autonomy needed for differentiation like a divisional structure does.
IIA Standard 2110 - Governance: Internal auditors assess business structures and strategies for alignment with organizational objectives.
COSO Framework - Performance Component: Ensures organizational structure supports strategic goals.
Key Reasons Why Option B is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is B. Divisional structure.
In accounting, which of the following statements is true regarding the terms debit and credit?
Debit indicates the right side of an account and credit the left side
Debit means an increase in an account and credit means a decrease.
Credit indicates the right side of an account and debit the left side.
Credit means an increase in an account and debit means a decrease
In accounting, the terms debit (Dr.) and credit (Cr.) refer to the two sides of an account in the double-entry accounting system.
Definition of Debit and Credit in Accounting:
Every financial transaction affects at least two accounts in a double-entry system: one account is debited, and another is credited.
Debits (Dr.) appear on the left side, while credits (Cr.) appear on the right side of an account.
Accounting Equation:
Step-by-Step Justification:Assets=Liabilities+Equity\text{Assets} = \text{Liabilities} + \text{Equity}Assets=Liabilities+Equity
Debits increase assets and expenses.
Credits increase liabilities, equity, and revenues.
Why the Other Options Are Incorrect:
A. Debit indicates the right side of an account and credit the left side ❌
Incorrect, as debits are always recorded on the left side, and credits are always on the right side.
B. Debit means an increase in an account and credit means a decrease. ❌
Partially incorrect; it depends on the type of account:
For assets and expenses, debits increase and credits decrease.
For liabilities, equity, and revenues, credits increase and debits decrease.
D. Credit means an increase in an account and debit means a decrease. ❌
Also incorrect because increases and decreases depend on the type of account (e.g., debits increase assets but decrease liabilities).
IIA Standard 1210.A1: Internal auditors must be familiar with fundamental accounting principles.
IIA Practice Guide: Auditing Financial Statements: Ensures proper understanding of debits and credits in financial reporting.
GAAP & IFRS Accounting Standards: Define how debits and credits are recorded in financial statements.
IIA References:Thus, the correct answer is C. Credit indicates the right side of an account and debit the left side. ✅
The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?
Beginning inventory was overstated for the year.
Cost of goods sold was understated for the year.
Ending inventory was understated for the year.
Cost of goods sold was overstated for the year.
Understanding Net Income Overstatement:
Net Income (NI) = Revenue - Expenses
If net income is overstated, then expenses must be understated or revenue must be overstated.
Cost of Goods Sold (COGS) is an expense that directly affects net income.
Why Understated COGS Causes Overstated Net Income:
COGS = Beginning Inventory + Purchases - Ending Inventory
If COGS is understated, expenses are lower than they should be, resulting in a higher net income.
Why Other Options Are Incorrect:
A. Beginning inventory overstated: This would increase COGS (not decrease it), leading to a lower net income.
C. Ending inventory understated: This would increase COGS, reducing net income.
D. COGS overstated: This would result in a lower net income, not an overstatement.
IIA Standards and References:
IIA Standard 2120 – Risk Management: Internal auditors must assess financial misstatements and risks.
IIA Practice Guide: Auditing Financial Statement Close Processes (2018): Emphasizes accuracy in inventory and expense reporting.
COSO Internal Control – Integrated Framework: Supports accuracy in financial reporting and controls over misstated financial data.
Thus, the correct answer is B: Cost of goods sold was understated for the year.
Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?
Cash payback technique.
Discounted cash flow technique: net present value.
Annual rate of return
Discounted cash flow technique: internal rate of return.
Capital budgeting techniques help organizations evaluate long-term investment decisions by assessing future cash flows and their present value. A present value of an annuity table is commonly used in methods that involve discounted cash flows over multiple periods.
Let's analyze the options:
A. Cash payback technique.
Incorrect. The payback period simply calculates the time needed to recover an investment and does not use discounting or present value tables.
B. Discounted cash flow technique: net present value (NPV).
Incorrect. While NPV involves discounting future cash flows, it does not specifically rely on the present value of an annuity table. Instead, NPV uses individual present values of cash flows at a specific discount rate.
C. Annual rate of return.
Incorrect. This method calculates return on investment based on accounting numbers and does not involve discounting future cash flows.
D. Discounted cash flow technique: internal rate of return (IRR). ✅ (Correct Answer)
Correct. The IRR method determines the discount rate that equates the present value of cash inflows to the initial investment (i.e., NPV = 0).
The present value of an annuity table is essential in IRR calculations, especially when future cash flows occur at regular intervals.
IRR is widely used in capital budgeting to compare different investment opportunities.
IIA GTAG (Global Technology Audit Guide) – Auditing Capital Budgeting Decisions – Discusses techniques used for investment evaluation.
COSO ERM Framework – Financial Decision-Making – Covers capital budgeting risks and techniques.
GAAP & IFRS – Investment Decision Guidelines – Explains the importance of present value calculations in investment evaluations.
IIA Standard 2130 – Control Over Capital Investments – Focuses on internal audit’s role in assessing capital budgeting techniques.
IIA References:
An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?
The organizational chart shows only formal relationships.
The organizational chart shows only the line of authority.
The organizational chart shows only the senior management positions.
The organizational chart is irrelevant when testing the control environment.
An organizational chart is a visual representation of the company's structure, depicting reporting lines and hierarchical relationships. However, it has limitations when assessing the control environment.
Let's analyze each option:
A. The organizational chart shows only formal relationships. ✅ (Correct Answer)
Correct. The organizational chart illustrates formal authority structures but does not capture informal relationships, influence, or communication patterns that impact decision-making and control effectiveness.
Informal networks, such as cross-functional collaboration and shadow leadership structures, are critical but not reflected in an org chart.
B. The organizational chart shows only the line of authority.
Incorrect. The org chart displays more than just authority lines, including departments, reporting structures, and sometimes functional responsibilities.
C. The organizational chart shows only the senior management positions.
Incorrect. Org charts often include multiple levels of employees, not just senior management. Many detailed org charts cover entire departments, middle management, and functional teams.
D. The organizational chart is irrelevant when testing the control environment.
Incorrect. While it has limitations, the org chart is still useful for understanding reporting lines, segregation of duties, and governance structures when assessing internal controls. It provides insights into accountability and decision-making authority.
IIA Standard 2130 – Control Environment Assessment – Highlights the importance of organizational structure in evaluating internal controls.
COSO Internal Control – Integrated Framework – Discusses how formal and informal structures impact control effectiveness.
IIA Practice Guide – Assessing Organizational Governance – Covers limitations of relying solely on formal organizational structures.
ISO 37000 – Governance of Organizations – Addresses the role of hierarchy and informal influence in corporate governance.
IIA References:Would you like me to verify more que
A company that supplies medications to large hospitals relies heavily on subcontractors to replenish any shortages within 24 hours. Where should internal auditors look for evidence that subcontractors are held responsible for this obligation?
The company's code of ethics.
The third-party management risk register.
The signed service-level agreement.
The subcontractors' annual satisfaction survey.
During a review of the accounts payable process, an internal auditor gathered all of the vendor payment transactions for the past 24 months. The auditor then used an Analytics tool to identify the top five vendors that received the highest sum of payments. Which of the following analytics techniques did the auditor apply?
Process analysis
Process mining
Data analysis.
Data mining
The auditor used an analytics tool to examine vendor payment transactions over 24 months and identify the top five vendors receiving the highest payments. This process involves examining, summarizing, and interpreting data, which falls under data analysis.
(A) Process analysis. ❌
Incorrect. Process analysis focuses on evaluating the workflow, efficiency, and control effectiveness of a business process, rather than analyzing data trends.
Example: Reviewing how invoices are processed to identify bottlenecks.
(B) Process mining. ❌
Incorrect. Process mining uses event logs and transactional data to analyze workflow patterns and deviations from standard procedures.
Example: Identifying inefficiencies in an invoice approval workflow.
(C) Data analysis. ✅
Correct. The auditor reviewed historical transaction data and extracted meaningful insights (i.e., the top five vendors by payment volume).
IIA GTAG – "Data Analytics: Elevating Internal Audit Performance" describes data analysis as using structured financial and operational data to identify trends, risks, or anomalies.
(D) Data mining. ❌
Incorrect. Data mining involves advanced statistical or machine learning techniques to discover hidden patterns in data, whereas data analysis focuses on summarizing and interpreting known data.
Example: Identifying fraudulent transactions using predictive modeling.
IIA GTAG – "Data Analytics: Elevating Internal Audit Performance"
IIA Standard 2320 – Analysis and Evaluation
COSO Framework – Data-Driven Internal Auditing
Analysis of Answer Choices:IIA References:Thus, the correct answer is C (Data analysis), as the auditor examined past transactions to summarize and interpret payment trends.
A third party who provides payroll services to the organization was asked to create audit or “read-only 1 functionalities in their systems. Which of the following statements is true regarding this request?
This will support execution of the right-to-audit clause.
This will enforce robust risk assessment practices
This will address cybersecurity considerations and concerns.
This will enhance the third party's ability to apply data analytics
A right-to-audit clause in a contract allows an organization to review and assess the operations, controls, and security measures of a third-party service provider (such as payroll service providers). Providing "read-only" functionalities supports this clause by enabling internal auditors to access and review relevant data without modifying it.
Read-only access allows auditors to verify transactions, data integrity, and compliance without affecting system operations.
This ensures that internal audit functions can review third-party controls without interference, supporting contractual audit rights.
The IIA’s Standard 2070 – External Service Provider Relationships states that organizations should retain the right to audit outsourced functions to ensure compliance with internal control policies.
B. This will enforce robust risk assessment practices → Incorrect. While read-only access can contribute to risk assessment, it does not directly enforce risk management policies.
C. This will address cybersecurity considerations and concerns. → Incorrect. Cybersecurity concerns involve encryption, authentication, and intrusion detection—not just read-only access.
D. This will enhance the third party's ability to apply data analytics → Incorrect. The request is for audit purposes, not to improve the third party’s analytics capabilities.
IIA’s Global Technology Audit Guide (GTAG) 7: IT Outsourcing recommends a right-to-audit clause in third-party agreements.
IIA Standard 1312 emphasizes that external audits should have transparent access to outsourced functions.
ISACA's COBIT Framework highlights the importance of audit access in managing third-party risks.
Why Option A is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is A. This will support execution of the right-to-audit clause.
Which of the following security controls would be me most effective in preventing security breaches?
Approval of identity request
Access logging.
Monitoring privileged accounts
Audit of access rights
Preventing security breaches requires proactive security controls, and the approval of identity requests ensures that only authorized individuals gain access to systems and data.
Types of Security Controls:
Preventive Controls (Stop security incidents before they happen)
Detective Controls (Identify security breaches after they occur)
Corrective Controls (Address security issues after detection)
Why Identity Request Approval is the Most Effective Preventive Control?
User access approval ensures that only verified personnel receive credentials.
According to IIA GTAG on Identity and Access Management, user provisioning must follow strict approval workflows to prevent unauthorized access.
By restricting access before a breach occurs, organizations reduce risks related to insider threats, phishing attacks, and credential misuse.
Why Not Other Options?
B. Access Logging:
Access logs record activity but do not prevent security breaches.
C. Monitoring Privileged Accounts:
Monitoring privileged accounts helps detect suspicious activity but does not stop unauthorized access beforehand.
D. Audit of Access Rights:
Regular audits ensure compliance but do not actively prevent unauthorized access in real-time.
IIA GTAG – Identity and Access Management
IIA Standard 2120 – Risk Management and IT Controls
COBIT 2019 – Access Control and Security Management
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is A. Approval of identity request.
Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?
Decentralized
Centralized
Departmentalized
Tall structure
A decentralized organizational structure allows decision-making authority to be distributed across various levels and locations, making it more flexible and adaptable to rapid changes and uncertainties.
Why Decentralization Helps in Uncertainty?
Decentralization empowers different units or teams to make faster decisions.
It enables quick adaptation to market shifts, technological advancements, and external disruptions.
According to IIA’s Organizational Governance Guidelines, decentralized structures increase agility and responsiveness, particularly in dynamic industries like technology and finance.
Characteristics of Decentralized Structures:
Autonomy at multiple levels – decisions are not centralized at the top.
Faster decision-making – local teams react quickly to changes.
Greater innovation and flexibility – promotes problem-solving without bureaucratic delays.
Why Not Other Options?
B. Centralized:
A centralized structure concentrates decision-making at the top, slowing down responsiveness to changes.
C. Departmentalized:
While departmentalization organizes work efficiently, it may restrict cross-functional collaboration, making adaptation slower.
D. Tall Structure:
Tall structures have multiple management layers, leading to bureaucracy and slower decision-making.
IIA Practice Guide: Organizational Governance
IIA Standard 2110 – Governance and Risk Management
COBIT 2019 – Enterprise Risk and Governance Framework
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is A. Decentralized.
Which of the following is a characteristic of big data?
Big data is often structured.
Big data analytic results often need to be visualized.
Big data is often generated slowly and is highly variable.
Big data comes from internal sources kept in data warehouses.
Big data refers to extremely large and complex datasets that require advanced analytics to extract insights. Effective visualization is a crucial step in making big data analytics actionable.
Let’s analyze the options:
A. Big data is often structured.
Incorrect. Big data can be structured, semi-structured, or unstructured. Many sources of big data (e.g., social media, sensor data, emails) are unstructured, making analysis more challenging.
B. Big data analytic results often need to be visualized. ✅ (Correct Answer)
Correct. Due to its complexity, big data analytics results must often be visualized using dashboards, charts, or graphs to communicate insights effectively.
Examples of visualization tools include Tableau, Power BI, and Google Data Studio.
C. Big data is often generated slowly and is highly variable.
Incorrect. Big data is typically generated rapidly and continuously (e.g., social media posts, IoT sensors, financial transactions). This relates to the "velocity" characteristic of big data.
D. Big data comes from internal sources kept in data warehouses.
Incorrect. Big data comes from both internal and external sources, including social media, cloud applications, and sensors. Additionally, data warehouses store structured data, whereas big data is often unstructured and stored in data lakes.
IIA GTAG – Auditing Big Data Analytics – Explores best practices for analyzing and visualizing big data.
COSO ERM Framework – Technology & Data Risk – Discusses the need for big data governance and visualization.
ISO/IEC 27032 – Cybersecurity and Data Analytics – Covers big data security and interpretation.
IIA Standard 2120 – Risk Management in Big Data Analytics – Focuses on internal auditors' role in overseeing data-driven decision-making.
IIA References:
Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?
UDAs arid traditional JT applications typically follow a similar development life cycle
A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.
Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.
IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.
User-Developed Applications (UDAs) are software tools, typically spreadsheets or small databases, created by business users rather than IT professionals. These applications often lack formal security, documentation, and control measures, increasing the risk of data errors, unauthorized access, and compliance failures.
UDAs are often created quickly to meet immediate business needs, without following IT governance, security controls, or development standards.
Unlike traditional IT applications, UDAs lack structured testing, change management, and formal documentation.
The IIA’s GTAG 14 – Auditing User-Developed Applications states that UDAs present higher risks because they are not subject to the same controls as IT-managed applications.
A. UDAs and traditional IT applications typically follow a similar development life cycle → Incorrect. Traditional IT applications follow a formal Software Development Life Cycle (SDLC), whereas UDAs are developed informally by end-users.
B. A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation. → Incorrect. IT applications require extensive documentation, whereas UDAs often lack documentation entirely.
D. IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly. → Incorrect. IT applications undergo rigorous testing and quality assurance, while UDAs often bypass IT reviews altogether.
IIA GTAG 14 – Auditing User-Developed Applications highlights the risks of UDAs and emphasizes the need for internal controls.
COBIT Framework (Control Objectives for Information and Related Technologies) recommends IT governance measures for all business-critical applications.
ISO 27001 (Information Security Management System) warns against uncontrolled user-developed applications due to security risks.
Why Option C is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is C. Unlike traditional IT applications, UDAs typically are developed with little consideration of controls.
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?
Project plan development.
Project plan execution
Integrated change control.
Project quality planning
In project integration management, the coordination of technical and organizational interfaces typically occurs during the Project Plan Execution phase. At this stage, project managers and teams work together to:
Implement the project plan.
Manage interdependencies between technical and business processes.
Ensure all project components are aligned.
Coordinate different stakeholders, vendors, and internal teams.
(A) Project plan development:
This phase involves defining objectives, scope, timelines, and resource allocation but does not focus on coordination of interfaces.
(B) Project plan execution (Correct Answer):
This phase involves implementing the project and actively managing its technical and organizational interfaces, making it the correct answer.
(C) Integrated change control:
This process ensures that project changes are properly managed, but it does not focus on initial coordination of interfaces.
(D) Project quality planning:
This phase focuses on setting quality standards and criteria, but not on the integration of technical and organizational interfaces.
IIA Practice Guide: Auditing Projects – Highlights that project execution is where coordination across different teams and stakeholders is critical.
PMBOK Guide (Project Management Body of Knowledge) – States that integration management during execution ensures that all elements of the project work together effectively.
COSO ERM Framework – Supports the alignment of business processes and technical execution as part of risk management.
Analysis of Each Option:IIA References:Conclusion:Since technical and organizational coordination is essential during project execution, option (B) is the correct answer.
Which of the following statements describes the typical benefit of using a flat organizational structure for the internal audit activity, compared to a hierarchical structure?
A flat structure results in lower operating and support costs than a hierarchical structure.
A flat structure results in a stable and very collaborative environment.
A flat structure enables field auditors to report to and learn from senior auditors.
A flat structure is more dynamic and offers more opportunities for advancement than a hierarchical structure.
Understanding Organizational Structures in Internal Audit:
A flat organizational structure has fewer levels of management, leading to faster decision-making, less bureaucracy, and lower administrative costs.
A hierarchical structure has multiple levels of management, which may improve control and oversight but increases complexity and costs.
Why a Flat Structure Reduces Operating and Support Costs:
Fewer management layers mean fewer salaries and reduced administrative expenses.
Streamlined decision-making reduces inefficiencies in reporting and communication.
Leaner support functions lead to cost savings in internal audit activity.
Why Other Options Are Less Relevant:
B. Stable and collaborative environment: Collaboration depends on culture, not just structure. Hierarchical models can also be collaborative.
C. Enables field auditors to report to senior auditors: This is more common in hierarchical structures where clear reporting lines exist.
D. More dynamic with advancement opportunities: Hierarchical structures often provide clearer career progression due to well-defined promotion paths.
IIA Standard 2030 – Resource Management: Encourages optimizing resources, which a flat structure can support.
IIA Practice Guide on Effective Internal Audit Governance: Discusses structural efficiency and cost control in internal audit.
COSO’s Internal Control Framework: Emphasizes efficient resource allocation in governance structures.
Relevant IIA References:✅ Final Answer: A flat structure results in lower operating and support costs than a hierarchical structure (Option A).
Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?
Prompt response and remediation policy
Inventory of information assets
Information access management
Standard security configurations
Information access management is the component of an organization’s cybersecurity risk assessment framework that allows management to implement user controls based on a user’s role. This principle, often referred to as Role-Based Access Control (RBAC), ensures that individuals have access only to the data and systems necessary for their job responsibilities.
Definition of Role-Based Access Control (RBAC):
RBAC assigns permissions based on an individual's role within the organization.
For example, a finance employee may access financial records, but not HR data.
Minimization of Insider Threats:
By limiting access to sensitive data, information access management helps reduce the risk of fraud, data breaches, and unauthorized modifications.
Regulatory Compliance:
Many regulations (e.g., GDPR, SOX, HIPAA) require companies to implement access control measures to protect sensitive information.
Internal auditors assess whether access management policies are enforced properly.
Alignment with Cybersecurity Risk Frameworks:
NIST Cybersecurity Framework – Access Control (AC) Family: Establishes guidelines for restricting access based on user identity and role.
ISO/IEC 27001 – Information Security Management System (ISMS): Requires organizations to implement access control policies to protect data integrity.
A. Prompt response and remediation policy: Focuses on incident response rather than proactive access control.
B. Inventory of information assets: Important for tracking IT assets but does not define access privileges.
D. Standard security configurations: Enforce security settings but do not manage access based on user roles.
IIA GTAG (Global Technology Audit Guide) on Information Security: Recommends implementing access control policies to restrict unauthorized access.
IIA Standard 2110 – Governance: Emphasizes the importance of cybersecurity governance, including role-based access management.
COBIT Framework – DSS05.04 (Manage User Identity and Access): Defines best practices for controlling user access based on organizational roles.
Step-by-Step Justification:Why Not the Other Options?IIA References:
Which of the following attributes of data is the most significantly impacted by the internet of things?
Normalization
Velocity
Structuration
Veracity
Understanding How IoT Impacts Data Attributes:
The Internet of Things (IoT) refers to connected devices that continuously collect and transmit data in real-time.
IoT generates massive amounts of data at high speeds, affecting the velocity of data processing and analysis.
Why Velocity is the Most Affected Attribute:
Velocity refers to the speed at which data is generated, processed, and transmitted.
IoT devices continuously stream data, requiring real-time or near-real-time processing.
Examples include:
Smart sensors in factories sending real-time equipment status.
Wearable devices tracking health metrics every second.
Smart cities using IoT for traffic monitoring and instant updates.
Why Other Options Are Incorrect:
A. Normalization – Incorrect.
Normalization refers to organizing database structures, but IoT deals with data transmission speed rather than database design.
C. Structuration – Incorrect.
Structuration relates to how data is formatted (structured vs. unstructured), but IoT’s biggest challenge is real-time data flow.
D. Veracity – Incorrect.
Veracity concerns data accuracy and reliability, which is a challenge in IoT but not the most significant impact compared to velocity.
IIA’s Perspective on IoT and Data Management:
IIA Standard 2110 – Governance emphasizes the need for robust data processing frameworks to handle IoT-generated data velocity.
IIA GTAG (Global Technology Audit Guide) on Big Data highlights real-time data analytics and IoT challenges.
ISO 27001 Information Security Standard recommends ensuring real-time data processing controls for IoT security and management.
IIA References:
IIA Standard 2110 – IT Governance & Data Management
IIA GTAG – IoT and Big Data Risks
ISO 27001 – Information Security and Real-Time Data Processing
Thus, the correct and verified answer is B. Velocity.
Copyright © 2014-2025 Certensure. All Rights Reserved