Which of the following networks is suitable for an organization that has operations In multiple cities and countries?
Wide area network.
Local area network
Metropolitan area network.
Storage area network.
A Wide Area Network (WAN) is the most suitable type of network for an organization that has operations in multiple cities and countries. WANs connect multiple local area networks (LANs) and other types of networks across long geographical distances, enabling seamless communication and data sharing among remote offices and branches.
A. Wide Area Network (WAN) (Correct Answer)
WANs cover extensive geographical areas, such as multiple cities, countries, or even continents.
They use various communication technologies, including leased lines, satellite connections, VPNs, and MPLS.
WANs enable organizations with distributed operations to centralize data management and enhance business continuity.
Example: An international corporation like a multinational bank or a global retail chain relies on a WAN to link its offices worldwide.
B. Local Area Network (LAN) (Incorrect Answer)
LANs are confined to a small area, such as an office building, factory, or campus.
They provide high-speed connectivity but are not designed for geographically dispersed locations.
Example: A single office using Ethernet and Wi-Fi to connect employees’ devices.
C. Metropolitan Area Network (MAN) (Incorrect Answer)
MANs span a city or a large campus but do not extend to multiple countries.
Example: A city's government agencies using a fiber-optic MAN for interdepartmental communication.
D. Storage Area Network (SAN) (Incorrect Answer)
SANs are dedicated high-speed networks designed for large-scale data storage and retrieval.
They are not meant for interconnecting geographically dispersed locations.
Example: A financial institution using a SAN for high-speed access to critical databases.
The IIA’s Global Technology Audit Guide (GTAG) – IT Risks and Controls emphasizes the importance of network infrastructure in securing and managing organizational data across multiple locations.
IIA Standard 2110 – Governance requires internal auditors to evaluate whether the organization’s IT strategy (including WAN infrastructure) supports business objectives and risk management.
IIA GTAG 17 – Auditing Network Security highlights the importance of WAN security, VPNs, and encryption when managing international operations.
Explanation of Answer Choices:IIA References:Thus, the correct answer is A. Wide Area Network (WAN).
Which of the following items best describes the strategy of outsourcing?
Contracting the work to Foreign Service providers to obtain lower costs
Contracting functions or knowledge-related work with an external service provider.
Contract -ng operation of some business functions with an internal service provider
Contracting a specific external service provider to work with an internal service provider
Understanding Outsourcing:
Outsourcing refers to contracting business processes, functions, or expertise to an external service provider.
Companies use outsourcing to reduce costs, access specialized skills, and improve efficiency.
Why Option B (Contracting Functions or Knowledge-Related Work with an External Provider) Is Correct?
Outsourcing involves delegating specific business functions (e.g., IT support, payroll, customer service) to external specialists.
IIA Standard 2110 – Governance supports evaluating outsourcing risks and effectiveness.
ISO 37500 – Outsourcing Management Framework emphasizes knowledge-based work outsourcing for expertise gains.
Why Other Options Are Incorrect?
Option A (Foreign service providers for cost savings):
While some outsourcing involves foreign providers, outsourcing is not limited to offshoring.
Option C (Internal service provider):
Internal service providers do not involve outsourcing, as the work remains within the company.
Option D (External + internal provider collaboration):
This describes co-sourcing, not pure outsourcing.
Outsourcing involves contracting business functions to an external provider, making option B correct.
IIA Standard 2110 supports governance over outsourcing decisions and risk management.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Outsourcing & Vendor Risk Management)
ISO 37500 – Outsourcing Management Framework
COSO ERM – Third-Party Risk Management in Outsourcing
The budgeted cost of work performed is a metric best used to measure which project management activity?
Resource planning.
Cost estimating
Cost budgeting.
Cost control.
Understanding the Metric:
The Budgeted Cost of Work Performed (BCWP), also known as Earned Value (EV), represents the value of work actually performed up to a specific date, based on the budgeted cost.
This metric is part of Earned Value Management (EVM) and is used to track project performance by comparing planned and actual progress.
Why Cost Control?
Cost control involves monitoring expenses, comparing actual performance with the budget, and taking corrective actions when needed.
BCWP is a core metric in cost control as it helps in determining whether a project is staying within budget.
Why Other Options Are Incorrect:
A. Resource planning: Focuses on allocating personnel, equipment, and materials but does not deal with financial performance.
B. Cost estimating: Involves predicting project costs before execution, but BCWP is used during the project, not during estimation.
C. Cost budgeting: Refers to setting a budget, whereas BCWP measures how much work has been performed relative to that budget.
IIA Standards and References:
IIA Standard 2120 – Risk Management: Internal auditors should assess cost control mechanisms to manage financial risks.
IIA Practice Guide: Auditing Capital Projects (2016): Emphasizes earned value management as a key cost control measure.
PMBOK Guide – Cost Management Knowledge Area: Highlights BCWP as a crucial tool for monitoring and controlling project costs.
The chief audit executive (CAE) has embraced a total quality management approach to improving the internal audit activity's (lAArs) processes. He would like to reduce the time to complete audits and improve client ratings of the IAA. Which of the following staffing approaches is the CAE most likely lo select?
Assign a team with a trained audit manager to plan each audit and distribute field work tasks to various staff auditors.
Assign a team of personnel who have different specialties to each audit and empower Team members to participate fully in key decisions
Assign a team to each audit, designate a single person to be responsible for each phase of the audit, and limit decision making outside of their area of responsibility.
Assign a team of personnel who have similar specialties to specific engagements that would benefit from those specialties and limit Key decisions to the senior person.
Total Quality Management (TQM) focuses on continuous improvement, teamwork, and process efficiency. The CAE’s goal is to reduce audit time and improve client satisfaction, which requires collaborative decision-making and diverse skill sets to ensure a high-quality, efficient audit process.
(A) Assign a team with a trained audit manager to plan each audit and distribute fieldwork tasks to various staff auditors. ❌
Incorrect. While structured planning is beneficial, TQM emphasizes decentralized decision-making rather than relying solely on the audit manager.
(B) Assign a team of personnel who have different specialties to each audit and empower team members to participate fully in key decisions. ✅
Correct. TQM encourages cross-functional teams, collaboration, and shared decision-making, which helps in reducing audit time and improving quality.
IIA GTAG "Auditing Continuous Improvement Initiatives" highlights diverse audit teams as a best practice for improving audit effectiveness.
(C) Assign a team to each audit, designate a single person to be responsible for each phase of the audit, and limit decision-making outside of their area of responsibility. ❌
Incorrect. This approach is too rigid and limits team collaboration, which contradicts TQM principles.
(D) Assign a team of personnel who have similar specialties to specific engagements that would benefit from those specialties and limit key decisions to the senior person. ❌
Incorrect. Specializing teams in certain audits may improve technical accuracy, but TQM promotes diverse perspectives rather than restricting decisions to one senior auditor.
IIA GTAG – "Auditing Continuous Improvement Initiatives"
IIA Standard 2110 – Governance (Process Improvement)
ISO 9001 – Total Quality Management Principles
Analysis of Answer Choices:IIA References:Thus, the correct answer is B, as TQM supports cross-functional teams and shared decision-making to improve audit efficiency and client satisfaction.
An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?
At fair value with changes reported in the shareholders' equity section.
At fair value with changes reported in net income.
At amortized cost in the income statement.
As current assets in the balance sheet
When an organization buys equity securities for trading purposes, it means that these securities are classified as trading securities. According to International Financial Reporting Standards (IFRS) and Generally Accepted Accounting Principles (GAAP):
Trading securities are measured at fair value.
Unrealized gains and losses from changes in fair value are recognized in net income, not in shareholders' equity.
A. At fair value with changes reported in the shareholders' equity section. (Incorrect)
This treatment applies to available-for-sale (AFS) securities under previous GAAP rules, but not to trading securities.
Under IFRS 9, AFS classification has been removed, and most equity investments are recorded at fair value through profit or loss (FVTPL).
B. At fair value with changes reported in net income. (Correct)
This is the correct treatment for trading securities, as per IFRS 9 and ASC 320 (FASB).
C. At amortized cost in the income statement. (Incorrect)
Amortized cost is used for held-to-maturity (HTM) debt securities, not for equity securities held for trading.
D. As current assets in the balance sheet. (Partially Correct but Incomplete)
While trading securities are usually classified as current assets, this answer does not address valuation and reporting of changes in fair value.
IIA Practice Guide: Auditing Investments highlights the importance of correctly valuing securities based on accounting standards.
IFRS 9 – Financial Instruments mandates fair value measurement for trading securities with gains/losses reported in profit or loss.
GAAP ASC 320 – Investments – Debt and Equity Securities aligns with IFRS, requiring fair value reporting through net income.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. At fair value with changes reported in net income.
Which of the following is a characteristic of big data?
Big data is often structured.
Big data analytic results often need to be visualized.
Big data is often generated slowly and is highly variable.
Big data comes from internal sources kept in data warehouses.
Big data refers to extremely large and complex datasets that require advanced analytics to extract insights. Effective visualization is a crucial step in making big data analytics actionable.
Let’s analyze the options:
A. Big data is often structured.
Incorrect. Big data can be structured, semi-structured, or unstructured. Many sources of big data (e.g., social media, sensor data, emails) are unstructured, making analysis more challenging.
B. Big data analytic results often need to be visualized. ✅ (Correct Answer)
Correct. Due to its complexity, big data analytics results must often be visualized using dashboards, charts, or graphs to communicate insights effectively.
Examples of visualization tools include Tableau, Power BI, and Google Data Studio.
C. Big data is often generated slowly and is highly variable.
Incorrect. Big data is typically generated rapidly and continuously (e.g., social media posts, IoT sensors, financial transactions). This relates to the "velocity" characteristic of big data.
D. Big data comes from internal sources kept in data warehouses.
Incorrect. Big data comes from both internal and external sources, including social media, cloud applications, and sensors. Additionally, data warehouses store structured data, whereas big data is often unstructured and stored in data lakes.
IIA GTAG – Auditing Big Data Analytics – Explores best practices for analyzing and visualizing big data.
COSO ERM Framework – Technology & Data Risk – Discusses the need for big data governance and visualization.
ISO/IEC 27032 – Cybersecurity and Data Analytics – Covers big data security and interpretation.
IIA Standard 2120 – Risk Management in Big Data Analytics – Focuses on internal auditors' role in overseeing data-driven decision-making.
IIA References:
A third party who provides payroll services to the organization was asked to create audit or “read-only 1 functionalities in their systems. Which of the following statements is true regarding this request?
This will support execution of the right-to-audit clause.
This will enforce robust risk assessment practices
This will address cybersecurity considerations and concerns.
This will enhance the third party's ability to apply data analytics
A right-to-audit clause in a contract allows an organization to review and assess the operations, controls, and security measures of a third-party service provider (such as payroll service providers). Providing "read-only" functionalities supports this clause by enabling internal auditors to access and review relevant data without modifying it.
Read-only access allows auditors to verify transactions, data integrity, and compliance without affecting system operations.
This ensures that internal audit functions can review third-party controls without interference, supporting contractual audit rights.
The IIA’s Standard 2070 – External Service Provider Relationships states that organizations should retain the right to audit outsourced functions to ensure compliance with internal control policies.
B. This will enforce robust risk assessment practices → Incorrect. While read-only access can contribute to risk assessment, it does not directly enforce risk management policies.
C. This will address cybersecurity considerations and concerns. → Incorrect. Cybersecurity concerns involve encryption, authentication, and intrusion detection—not just read-only access.
D. This will enhance the third party's ability to apply data analytics → Incorrect. The request is for audit purposes, not to improve the third party’s analytics capabilities.
IIA’s Global Technology Audit Guide (GTAG) 7: IT Outsourcing recommends a right-to-audit clause in third-party agreements.
IIA Standard 1312 emphasizes that external audits should have transparent access to outsourced functions.
ISACA's COBIT Framework highlights the importance of audit access in managing third-party risks.
Why Option A is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is A. This will support execution of the right-to-audit clause.
Which of the following controls is the most effective for ensuring confidentially of transmitted information?
Firewall.
Antivirus software.
Passwords.
Encryption.
Ensuring the confidentiality of transmitted information is crucial to protect data from unauthorized access during transmission. Here's an analysis of the provided options:
A. Firewall:
A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules. While it helps prevent unauthorized access to or from a private network, it doesn't encrypt the data being transmitted. Therefore, it doesn't ensure the confidentiality of the data during transmission.
B. Antivirus Software:
Antivirus software is designed to detect, prevent, and remove malicious software. It protects the system from malware but doesn't play a role in securing the confidentiality of data during transmission.
C. Passwords:
Passwords are used to authenticate users and control access to systems and data. While they help ensure that only authorized users can access certain information, they don't protect data during transmission from interception or eavesdropping.
D. Encryption:
Encryption involves converting plaintext data into a coded form (ciphertext) that is unreadable to unauthorized parties. Only those possessing the correct decryption key can convert the data back into its original form. By encrypting data before transmission, even if the data is intercepted, it remains unintelligible without the decryption key, thereby ensuring confidentiality. Encryption is widely recognized as one of the most effective methods for protecting data confidentiality during transmission.
Wikipedia
In conclusion, among the options provided, encryption is the most effective control for ensuring the confidentiality of transmitted information, making option D the correct answer.
An organization with a stable rating, as assessed by International rating agencies, has issued a bond not backed by assets or collateral. Payments of the interests and the principal to bondholders are guaranteed by the organization. Which type of bond did the organization issue?
A sinking fund bond.
A secured bond.
A junk bond.
A debenture bond
A debenture bond is an unsecured bond that is not backed by specific assets or collateral. Instead, it is backed only by the issuer’s creditworthiness and general reputation. Since the organization in this scenario has a stable rating from international rating agencies and guarantees interest and principal payments, it aligns perfectly with the definition of a debenture bond.
A. A sinking fund bond – A bond that has a special account (sinking fund) where money is set aside to pay off bondholders over time. This is not mentioned in the scenario.
B. A secured bond – This type of bond is backed by specific assets or collateral to reduce investor risk. However, the scenario states that the bond is not backed by assets or collateral, eliminating this choice.
C. A junk bond – These are high-risk, high-yield bonds issued by companies with low credit ratings. The scenario specifies that the company has a stable rating, making this incorrect.
D. A debenture bond (Correct Answer) – Since this bond is unsecured and relies solely on the organization's financial health, it matches the definition of a debenture bond.
IIA IPPF Standard 2120 – Risk Management discusses financial risk management, including bond issuance.
COSO ERM Framework – Financial Risk Management emphasizes evaluating creditworthiness before issuing debt.
IFRS 9 – Financial Instruments provides accounting guidance on different bond types.
Explanation of Each Option:IIA References:
In accounting, which of the following statements is true regarding the terms debit and credit?
Debit indicates the right side of an account and credit the left side
Debit means an increase in an account and credit means a decrease.
Credit indicates the right side of an account and debit the left side.
Credit means an increase in an account and debit means a decrease
In accounting, the terms debit (Dr.) and credit (Cr.) refer to the two sides of an account in the double-entry accounting system.
Definition of Debit and Credit in Accounting:
Every financial transaction affects at least two accounts in a double-entry system: one account is debited, and another is credited.
Debits (Dr.) appear on the left side, while credits (Cr.) appear on the right side of an account.
Accounting Equation:
Step-by-Step Justification:Assets=Liabilities+Equity\text{Assets} = \text{Liabilities} + \text{Equity}Assets=Liabilities+Equity
Debits increase assets and expenses.
Credits increase liabilities, equity, and revenues.
Why the Other Options Are Incorrect:
A. Debit indicates the right side of an account and credit the left side ❌
Incorrect, as debits are always recorded on the left side, and credits are always on the right side.
B. Debit means an increase in an account and credit means a decrease. ❌
Partially incorrect; it depends on the type of account:
For assets and expenses, debits increase and credits decrease.
For liabilities, equity, and revenues, credits increase and debits decrease.
D. Credit means an increase in an account and debit means a decrease. ❌
Also incorrect because increases and decreases depend on the type of account (e.g., debits increase assets but decrease liabilities).
IIA Standard 1210.A1: Internal auditors must be familiar with fundamental accounting principles.
IIA Practice Guide: Auditing Financial Statements: Ensures proper understanding of debits and credits in financial reporting.
GAAP & IFRS Accounting Standards: Define how debits and credits are recorded in financial statements.
IIA References:Thus, the correct answer is C. Credit indicates the right side of an account and debit the left side. ✅
Which of the following is an example of a physical control designed to prevent security breaches?
Preventing database administrators from initiating program changes
Blocking technicians from getting into the network room.
Restricting system programmers' access to database facilities
Using encryption for data transmitted over the public internet
Physical controls are security measures that prevent unauthorized physical access to critical assets, such as IT infrastructure, sensitive documents, or restricted areas.
(A) Preventing database administrators from initiating program changes:
This is a logical (IT) control rather than a physical control. Logical controls manage access permissions and prevent unauthorized software changes.
(B) Blocking technicians from getting into the network room (Correct Answer):
This is a physical control because it prevents unauthorized personnel from physically accessing critical IT infrastructure, such as servers and networking devices.
Unauthorized access to a network room could lead to data breaches, hardware manipulation, or cyberattacks.
(C) Restricting system programmers' access to database facilities:
This is an access control measure, which can be either logical (permissions, role-based access) or physical. However, it primarily refers to IT access controls rather than a physical security measure.
(D) Using encryption for data transmitted over the public internet:
This is a technical control, not a physical one. Encryption protects data but does not prevent physical breaches.
IIA GTAG 17: Auditing IT Security – Emphasizes the role of physical security in protecting IT infrastructure.
COBIT Framework – DSS05 (Manage Security Services) – Highlights physical access restrictions as a key security measure.
ISO/IEC 27001: Information Security Management System – Identifies physical security as a fundamental control for IT risk management.
Analysis of Each Option:IIA References:Conclusion:Since physical security controls prevent unauthorized physical access, option (B) is the correct answer.
Which of the following physical access controls often functions as both a preventive and detective control?
Locked doors.
Firewalls.
Surveillance cameras.
Login IDs and passwords.
Understanding Physical Access Controls:
Physical access controls protect assets by preventing unauthorized access and detecting potential security violations.
Controls can be preventive (stop incidents from occurring) or detective (identify incidents after they occur).
Why Surveillance Cameras Function as Both Preventive and Detective Controls:
Preventive: The presence of cameras discourages unauthorized access and malicious activities.
Detective: If an incident occurs, cameras provide recorded evidence for investigation and accountability.
Why Other Options Are Less Suitable:
A. Locked doors – Purely preventive, as they block unauthorized access but do not detect breaches.
B. Firewalls – Primarily an IT security measure, not a physical access control.
D. Login IDs and passwords – These are logical (IT) access controls, not physical controls.
IIA GTAG 15 – Auditing Privacy and Security Risks: Highlights the dual role of surveillance as a preventive and detective control.
IIA Standard 2120 – Risk Management: Encourages controls that both prevent and detect risks.
COSO’s Internal Control Framework: Supports security measures that serve multiple control functions.
Relevant IIA References:✅ Final Answer: Surveillance cameras (Option C).
An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?
Customers can access and update personal information when needed.
The organization retains customers' personal information indefinitely.
Customers reserve the right to reject sharing personal information with third parties.
The organization performs regular maintenance on customers' personal information.
Organizations must comply with privacy principles that emphasize data retention limitations. Keeping personal data indefinitely violates privacy laws and regulations such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA).
Privacy Regulations Require Data Minimization:
GDPR Article 5(1)(e) states that personal data should only be kept for as long as necessary for the intended purpose.
IIA GTAG 4: Management of IT Auditing also advises against excessive data retention.
Security and Risk Concerns:
Storing data indefinitely increases the risk of data breaches.
IIA Standard 2110 – Governance emphasizes the need for proper information security governance to protect personal data.
Legal and Compliance Issues:
Organizations are required to define retention policies to prevent unauthorized or unnecessary storage of personal data.
A. Customers can access and update personal information when needed. (Incorrect)
Reason: Allowing customers to access and update their information aligns with privacy principles such as data accuracy and transparency.
C. Customers reserve the right to reject sharing personal information with third parties. (Incorrect)
Reason: This supports data control rights, which is consistent with privacy standards like opt-in and opt-out policies.
D. The organization performs regular maintenance on customers' personal information. (Incorrect)
Reason: Regular maintenance (e.g., updates, corrections, deletions) enhances data accuracy and security, aligning with privacy best practices.
IIA Global Technology Audit Guide (GTAG) 4: Management of IT Auditing – Discusses data privacy principles.
IIA Standard 2110 – Governance – Ensures data security and regulatory compliance.
IIA GTAG 8: Auditing Application Controls – Covers data retention policies and privacy compliance.
Privacy Regulations: GDPR (Article 5), CCPA (Section 1798.105) – Require organizations to delete data once it is no longer needed.
Why is Indefinite Retention a Violation?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is B. The organization retains customers' personal information indefinitely.
Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?
Analysis of the full population of existing data.
Verification of the completeness and integrity of existing data.
Continuous monitoring on a repetitive basis.
Analysis of the databases of partners, such as suppliers.
To identify very small control and transaction anomalies, internal auditors should analyze the entire dataset rather than a sample. Full population analysis increases the likelihood of detecting:
Unusual transaction patterns, including fraud, errors, and control weaknesses.
Rare or subtle anomalies that might be missed in sampling-based audits.
Machine-learning-based fraud detection and exception analysis.
A. Analysis of the full population of existing data. (Correct)
This approach ensures complete coverage, reduces sampling risk, and detects rare anomalies.
Modern data analytics tools allow auditors to analyze entire datasets efficiently.
B. Verification of the completeness and integrity of existing data. (Incorrect)
While data integrity checks ensure reliable data, they do not actively identify anomalies or suspicious patterns.
C. Continuous monitoring on a repetitive basis. (Incorrect, but relevant)
Continuous monitoring is useful for ongoing fraud detection, but it does not guarantee full anomaly detection unless it covers all transactions.
Full population analysis is more comprehensive for identifying small anomalies.
D. Analysis of the databases of partners, such as suppliers. (Incorrect)
While analyzing external data sources can uncover vendor fraud, it does not address internal control or transaction anomalies within the organization.
IIA GTAG 3 – Continuous Auditing recommends full population analysis as a best practice for anomaly detection.
IIA Standard 1220 – Due Professional Care requires auditors to use advanced analytical techniques to detect control weaknesses.
COSO Framework – Fraud Risk Management Guide suggests full transaction data analysis for effective fraud detection.
Explanation of Answer Choices:IIA References:Thus, the correct answer is A. Analysis of the full population of existing data.
An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?
Required documentation of process for discontinuing use of the devices
Required removal of personal pictures and contacts.
Required documentation of expiration of contract with service provider.
Required sign-off on conflict of interest statement.
When an organization allows managers to use their own smartphones at work under a Bring Your Own Device (BYOD) policy, IT security and risk management become critical. The most important policy and procedure to include would be documenting the process for discontinuing use of the devices to ensure data security, compliance, and risk mitigation when employees leave the company or change roles.
Data Security & Compliance: Ensuring that sensitive company data is removed securely when an employee leaves or replaces a device is crucial to prevent unauthorized access.
Access Control & Endpoint Management: The IT department needs a clear policy to revoke access to corporate applications and networks when a device is no longer in use.
Risk Mitigation: Unauthorized access to company systems through lost, stolen, or retired devices can lead to security breaches.
Option B (Required removal of personal pictures and contacts): Personal data does not impact company security and is irrelevant to corporate IT policies.
Option C (Required documentation of expiration of contract with service provider): This is the employee's responsibility, not the organization's, and does not address security risks.
Option D (Required sign-off on conflict of interest statement): While conflict of interest policies are important, they are unrelated to IT security concerns related to BYOD.
IIA’s GTAG (Global Technology Audit Guide) on Managing and Auditing IT Vulnerabilities emphasizes the importance of BYOD risk management, including clear procedures for device decommissioning.
IIA's Business Knowledge for Internal Auditing (CIA Exam Syllabus - Part 3) highlights IT governance frameworks that require policies for data access and security when using personal devices.
Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is A. Required documentation of process for discontinuing use of the devices.
Which of the following common quantitative techniques used in capital budgeting is best associated with the use of a table that describes the present value of an annuity?
Cash payback technique.
Discounted cash flow technique: net present value.
Annual rate of return
Discounted cash flow technique: internal rate of return.
Capital budgeting techniques help organizations evaluate long-term investment decisions by assessing future cash flows and their present value. A present value of an annuity table is commonly used in methods that involve discounted cash flows over multiple periods.
Let's analyze the options:
A. Cash payback technique.
Incorrect. The payback period simply calculates the time needed to recover an investment and does not use discounting or present value tables.
B. Discounted cash flow technique: net present value (NPV).
Incorrect. While NPV involves discounting future cash flows, it does not specifically rely on the present value of an annuity table. Instead, NPV uses individual present values of cash flows at a specific discount rate.
C. Annual rate of return.
Incorrect. This method calculates return on investment based on accounting numbers and does not involve discounting future cash flows.
D. Discounted cash flow technique: internal rate of return (IRR). ✅ (Correct Answer)
Correct. The IRR method determines the discount rate that equates the present value of cash inflows to the initial investment (i.e., NPV = 0).
The present value of an annuity table is essential in IRR calculations, especially when future cash flows occur at regular intervals.
IRR is widely used in capital budgeting to compare different investment opportunities.
IIA GTAG (Global Technology Audit Guide) – Auditing Capital Budgeting Decisions – Discusses techniques used for investment evaluation.
COSO ERM Framework – Financial Decision-Making – Covers capital budgeting risks and techniques.
GAAP & IFRS – Investment Decision Guidelines – Explains the importance of present value calculations in investment evaluations.
IIA Standard 2130 – Control Over Capital Investments – Focuses on internal audit’s role in assessing capital budgeting techniques.
IIA References:
According to Maslow's hierarchy of needs theory, which of the following would likely have the most impact on retaining staff, if their lower-level needs are already met?
Social benefits.
Compensation.
Job safety.
Recognition
According to Maslow’s hierarchy of needs, once an individual’s lower-level needs (physiological, safety, and social needs) are met, they seek higher-level motivators such as esteem and self-actualization. Recognition falls under esteem needs, which include respect, status, and appreciation. Employees who feel valued and recognized are more likely to stay with an organization.
A. Social benefits – These are lower-level needs (belongingness/social needs), which have already been met in this scenario.
B. Compensation – While salary is important, it primarily addresses physiological and security needs, which are lower on Maslow’s hierarchy. Once these are met, higher-level motivators like recognition become more influential.
C. Job safety – Safety and security are lower-level needs, and in this scenario, they are already met.
D. Recognition (Correct Answer) – Falls under esteem needs, which are crucial for employee retention once basic needs are satisfied.
IIA IPPF Standard 2120 – Risk Management includes talent management as part of organizational sustainability.
COSO ERM Framework – Human Capital Risk highlights employee motivation as a key factor in risk management.
IIA GTAG 7 – Managing IT Security Risks discusses employee satisfaction and its impact on organizational security and retention.
Explanation of Each Option:IIA References:
During disaster recovery planning, the organization established a recovery point objective. Which of the following best describes this concept?
The maximum tolerable downtime after the occurrence of an incident.
The maximum tolerable data loss after the occurrence of an incident.
The maximum tolerable risk related to the occurrence of an incident
The minimum recovery resources needed after the occurrence of an incident
Recovery Point Objective (RPO) Defined:
RPO is the maximum amount of data loss an organization can tolerate before it significantly impacts business operations.
It determines how frequently backups should be performed to minimize data loss in the event of a system failure, cyberattack, or disaster.
For example: If an organization has an RPO of 4 hours, backups must be performed at least every 4 hours to ensure minimal data loss.
IIA GTAG on Business Continuity Management states that RPO should align with business risk tolerance and data criticality.
A. The maximum tolerable downtime after the occurrence of an incident. (Incorrect)
This defines the Recovery Time Objective (RTO), which refers to the time needed to restore operations.
RPO relates to data loss, not downtime.
C. The maximum tolerable risk related to the occurrence of an incident. (Incorrect)
Risk tolerance is a separate concept related to risk management strategies, not data recovery.
D. The minimum recovery resources needed after the occurrence of an incident. (Incorrect)
This refers to disaster recovery planning and resource allocation, not the specific metric of data loss tolerance.
Explanation of Incorrect Answers:Conclusion:The Recovery Point Objective (RPO) measures the maximum allowable data loss (Option B) before it significantly affects business continuity.
IIA References:
IIA GTAG - Business Continuity Management
IIA Standard 2120 - Risk Management
Which of the following backup methodologies would be most efficient in backing up a database in the production environment?
Disk mirroring of the data being stored on the database.
A differential backup that is performed on a weekly basis.
An array of independent disks used to back up the database.
An incremental backup of the database on a daily basis.
Database backup methodologies ensure data protection and recovery in case of failures, system crashes, or cyber incidents. The most efficient method balances performance, storage, and recovery speed.
Incremental Backup on a Daily Basis (Correct Answer: D)
Incremental backups store only the changes made since the last backup.
This method saves storage space and reduces backup time, making it highly efficient for large production databases.
IIA Standard 2120 – Risk Management emphasizes that auditors must assess the efficiency and reliability of IT controls, including backup strategies.
This approach minimizes downtime and ensures the most recent data is available for recovery.
Why the Other Options Are Incorrect:
A. Disk Mirroring (Incorrect)
Disk mirroring (RAID 1) creates an exact real-time copy of data, but it is not a backup method—it only provides redundancy.
If corruption occurs in the database, the mirrored disk will also have corrupted data.
B. Weekly Differential Backup (Incorrect)
Differential backups store changes since the last full backup, but performing them only weekly means data loss could be significant if a failure occurs mid-week.
They consume more storage over time compared to incremental backups.
C. Independent Disk Array (Incorrect)
Redundant Arrays of Independent Disks (RAID) are primarily used for storage performance and fault tolerance, not as an efficient backup methodology.
RAID does not replace the need for incremental or full backups.
IIA Standard 2120 – Risk Management (Assessing IT controls, including backup and data recovery strategies)
IIA Standard 2110 – Governance (Ensuring IT risk management aligns with organizational objectives)
IIA Standard 2130 – Compliance (Verifying adherence to IT security and backup policies)
Step-by-Step Justification:IIA References for This Answer:Thus, the best answer is D. An incremental backup of the database on a daily basis, as it optimizes efficiency, reduces storage usage, and ensures up-to-date backups with minimal disruption.
What is the primary purpose of data and systems backup?
To restore all data and systems immediately after the occurrence of an incident.
To set the maximum allowable downtime to restore systems and data after the occurrence of an incident.
To set the point in time to which systems and data must be recovered after the occurrence of an incident.
To restore data and systems to a previous point in time after the occurrence of an incident
Data and system backups are a critical part of business continuity and disaster recovery (BC/DR) strategies, ensuring that organizations can restore data and systems to a prior state in the event of system failure, cyberattacks, or disasters.
Primary Purpose of Backup Systems:
The core objective of data and systems backup is to restore data and systems to a previous point in time in case of an unexpected incident.
According to IIA GTAG on Business Continuity Management, backups enable organizations to recover lost, corrupted, or compromised data from an earlier state.
Why Not Other Options?
A. To restore all data and systems immediately after the occurrence of an incident:
This is a misconception because restoration times depend on the Recovery Time Objective (RTO) and the complexity of the incident.
B. To set the maximum allowable downtime to restore systems and data after the occurrence of an incident:
This describes RTO, which is part of business continuity planning but not the primary purpose of backups.
C. To set the point in time to which systems and data must be recovered after the occurrence of an incident:
This describes the Recovery Point Objective (RPO), which determines the acceptable amount of data loss but does not define the main goal of backups.
IIA GTAG – Business Continuity Management
IIA Practice Guide: Auditing Business Continuity and Disaster Recovery
IIA Standard 2120 – Risk Management and IT Controls
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is D. To restore data and systems to a previous point in time after the occurrence of an incident
An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?
Duplicate testing.
Joining data sources.
Gap analysis.
Classification
The internal auditor compared vendor addresses (Finance Department records) with employee addresses (Payroll Department records). This process is an example of "Joining Data Sources", which involves merging different datasets to identify relationships, discrepancies, or anomalies.
Definition of Joining Data Sources:
This technique is used in data analytics when an auditor merges two or more datasets based on a common field (e.g., addresses in this case).
It helps identify potential conflicts of interest or fraudulent transactions, such as employees creating fake vendors to receive unauthorized payments.
Application in Auditing:
The auditor is cross-referencing records from two different departments to check for potential fraud, duplicate payments, or unauthorized vendor relationships.
If vendor addresses match employee addresses, it could indicate a fraud risk (e.g., an employee making payments to a shell company they control).
A. Duplicate Testing: ❌
Involves identifying duplicate records within a single dataset, such as repeated invoice numbers or duplicate payments to the same vendor.
Here, the auditor is comparing two datasets, not searching for duplicates in one dataset.
C. Gap Analysis: ❌
Identifies missing data or discrepancies between expected and actual records (e.g., missing vendor payments).
In this case, the auditor is not looking for missing data but rather comparing records.
D. Classification: ❌
Involves categorizing data into predefined groups (e.g., classifying vendors as high-risk or low-risk).
The auditor is not categorizing vendors but matching addresses across datasets.
IIA GTAG (Global Technology Audit Guide) – Data Analytics for Internal Auditors: Discusses joining data sources to detect fraud, errors, and conflicts of interest.
IIA Standard 1220 (Due Professional Care): Requires auditors to apply appropriate data analysis techniques to assess risks effectively.
ACFE (Association of Certified Fraud Examiners) – Fraud Detection Techniques: Recommends cross-referencing employee and vendor records to detect fraud schemes.
Step-by-Step Justification:Why Not the Other Options?IIA References:Thus, the correct answer is B. Joining data sources. ✅
An IT auditor is evaluating IT controls of a newly purchased information system. The auditor discovers that logging is not configured al database and application levels. Operational management explains that they do not have enough personnel to manage the logs and they see no benefit in keeping logs. Which of the fallowing responses best explains risks associated with insufficient or absent logging practices?
The organization will be unable to develop preventative actions based on analytics.
The organization will not be able to trace and monitor the activities of database administers.
The organization will be unable to determine why intrusions and cyber incidents took place.
The organization will be unable to upgrade the system to newer versions.
Logging at the database and application levels is a critical security control that enables monitoring, detecting, and investigating potential security incidents. The absence of logging significantly increases cybersecurity risks and can leave an organization vulnerable to undetected attacks.
Incident Response & Forensics: Without logs, the organization will be unable to determine the cause, origin, and impact of cyber incidents or system intrusions.
Compliance Requirements: Many regulatory frameworks (e.g., ISO 27001, NIST 800-53, GDPR, PCI-DSS, SOX) require logging for security monitoring and auditability.
Threat Detection: Logs help in identifying malicious activities, unauthorized access, and data breaches.
Accountability: Ensures that actions taken within the system can be traced back to specific users or administrators.
Option A (The organization will be unable to develop preventative actions based on analytics): While logging helps in analytics, its primary function is incident detection and forensic investigation.
Option B (The organization will not be able to trace and monitor the activities of database administrators): This is partially correct, but logging is not just for administrators—it is essential for monitoring all system activities, including unauthorized access attempts.
Option D (The organization will be unable to upgrade the system to newer versions): Logging does not impact system upgrades; upgrades are related to software lifecycle management, not logging practices.
IIA’s Global Technology Audit Guide (GTAG) – Information Security Controls recommends logging as a fundamental security control.
IIA Standard 2110 – IT Governance: Emphasizes the need for adequate IT risk management, including logging.
COSO Framework (Monitoring Component): Highlights the importance of system monitoring, which includes logging.
Why Option C is Correct:Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is C. The organization will be unable to determine why intrusions and cyber incidents took place.
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
Collections from customers
Sale of securities.
Purchase of trucks.
Payment of debt, including interest
Understanding the Financing Section of a Cash Budget:
A cash budget is a financial plan that outlines expected cash inflows and outflows over a specific period.
The financing section records activities related to borrowing, repaying debt, issuing securities, and managing interest payments.
Why Debt and Interest Payments Belong in the Financing Section:
Debt repayment (principal and interest) is a financial activity rather than an operational or investing activity.
Companies must plan for financing costs to ensure liquidity and compliance with loan agreements.
Why Other Options Are Incorrect:
A. Collections from customers – Incorrect.
Customer payments belong in the operating section of the cash budget, as they represent core business activities.
B. Sale of securities – Incorrect.
The sale of securities is an investing activity unless related to issuing new debt or equity.
C. Purchase of trucks – Incorrect.
Buying trucks is a capital expenditure, which belongs in the investing section of the cash budget.
IIA’s Perspective on Financial Planning and Budgeting:
IIA Standard 2120 – Risk Management requires organizations to assess financial risks, including debt repayment obligations.
COSO ERM Framework highlights the importance of cash flow forecasting to maintain financial stability.
GAAP and IFRS Financial Reporting Standards classify debt repayment and interest under financing activities.
IIA References:
IIA Standard 2120 – Risk Management & Cash Flow Oversight
COSO ERM – Financial Planning and Liquidity Management
GAAP & IFRS – Cash Flow Statement Classifications
Thus, the correct and verified answer is D. Payment of debt, including interest.
Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?
Decentralized
Centralized
Departmentalized
Tall structure
A decentralized organizational structure allows decision-making authority to be distributed across various levels and locations, making it more flexible and adaptable to rapid changes and uncertainties.
Why Decentralization Helps in Uncertainty?
Decentralization empowers different units or teams to make faster decisions.
It enables quick adaptation to market shifts, technological advancements, and external disruptions.
According to IIA’s Organizational Governance Guidelines, decentralized structures increase agility and responsiveness, particularly in dynamic industries like technology and finance.
Characteristics of Decentralized Structures:
Autonomy at multiple levels – decisions are not centralized at the top.
Faster decision-making – local teams react quickly to changes.
Greater innovation and flexibility – promotes problem-solving without bureaucratic delays.
Why Not Other Options?
B. Centralized:
A centralized structure concentrates decision-making at the top, slowing down responsiveness to changes.
C. Departmentalized:
While departmentalization organizes work efficiently, it may restrict cross-functional collaboration, making adaptation slower.
D. Tall Structure:
Tall structures have multiple management layers, leading to bureaucracy and slower decision-making.
IIA Practice Guide: Organizational Governance
IIA Standard 2110 – Governance and Risk Management
COBIT 2019 – Enterprise Risk and Governance Framework
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is A. Decentralized.
Management has established a performance measurement focused on the accuracy of disbursements. The disbursement statistics, provided daily to ail accounts payable and audit staff, include details of payments stratified by amount and frequency. Which of the following is likely to be the greatest concern regarding this performance measurement?
Articulation of the data
Availability of the data.
Measurability of the data
Relevance of the data.
Performance Measurement Should Provide Meaningful Insights:
While providing detailed statistics on disbursements, the greatest concern is whether the data is relevant to achieving the objective of accurate disbursements.
If the data does not directly support decision-making or process improvements, it may not serve its intended purpose.
IIA Standard 2010 - Planning requires internal auditors to evaluate the relevance of information used in decision-making.
A. Articulation of the data (Incorrect)
The way the data is presented is important but is a secondary concern compared to whether the data is relevant.
B. Availability of the data (Incorrect)
While timely access to data is critical, the primary concern is whether the data is meaningful in evaluating disbursement accuracy.
C. Measurability of the data (Incorrect)
The data is already being measured and reported; the real issue is whether it provides useful insights for improving accuracy.
Explanation of Incorrect Answers:Conclusion:The greatest concern with this performance measurement is whether the data is relevant (Option D) to assessing disbursement accuracy and guiding improvements.
IIA References:
IIA Standard 2010 - Planning
Which of the following can be classified as debt investments?
Investments in the capital stock of a corporation
Acquisition of government bonds.
Contents of an investment portfolio,
Acquisition of common stock of a corporation
Debt investments refer to financial instruments where an investor lends money to an entity (corporation, government, or institution) in exchange for periodic interest payments and the repayment of the principal amount at maturity. These include:
Government bonds (such as U.S. Treasury bonds, municipal bonds, and sovereign bonds)
Corporate bonds
Certificates of deposit (CDs)
Commercial paper
A. Investments in the capital stock of a corporation → Incorrect. Capital stock represents ownership (equity investments), not debt investments.
C. Contents of an investment portfolio → Incorrect. A portfolio may contain both equity and debt investments, making this too broad to classify specifically as debt.
D. Acquisition of common stock of a corporation → Incorrect. Common stock is an equity investment, not a debt investment.
The IIA’s Global Internal Audit Standards on Investment Management and Risk Assessment highlight debt instruments as fixed-income securities.
International Financial Reporting Standards (IFRS 9 – Financial Instruments) classify bonds and loans as debt investments, distinct from equity instruments.
The Generally Accepted Accounting Principles (GAAP) – FASB ASC 320 specifies how to account for debt securities.
Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is B. Acquisition of government bonds.
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Relationship with supervisor
Salary
Security.
Achievement
Which of the following best describes the use of predictive analytics?
A supplier of electrical parts analyzed an instances where different types of spare parts were out of stock prior to scheduled deliveries of those parts.
A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
A supplier of electrical parts analyzed all instances of a part being, out of stock poor to its scheduled delivery date and discovered that increases in sales of that part consistently correlated with stormy weather.
A supplier of electrical parts analyzed sales and stock information and modelled different scenarios for making decisions on stock reordering and delivery
Understanding Predictive Analytics:
Predictive analytics involves using historical data, statistical algorithms, and machine learning techniques to forecast future trends and behaviors.
It applies assumptions and models patterns to predict outcomes, helping businesses make proactive decisions.
Why Option B is Correct:
Predictive analytics is forward-looking and uses assumptions (e.g., weather conditions) to predict where stock levels would decrease more quickly.
This aligns with the goal of predictive analytics: forecasting potential events before they occur.
Why Other Options Are Incorrect:
A. Analyzed instances where parts were out of stock before scheduled deliveries: This is descriptive analytics, as it looks at past data without making future predictions.
C. Analyzed past stockouts and found a correlation with stormy weather: This is diagnostic analytics, as it identifies past correlations but does not predict future trends.
D. Modeled different scenarios for stock reordering and delivery decisions: This is prescriptive analytics, which focuses on decision-making rather than predictions.
IIA Standards and References:
IIA GTAG on Data Analytics (2017): Highlights predictive analytics as a tool for forecasting risks and operational inefficiencies.
IIA Standard 1220 – Due Professional Care: Encourages auditors to use analytical techniques to anticipate potential issues.
COSO ERM Framework: Supports the use of predictive models to improve risk management and strategic planning.
Thus, the correct answer is B: A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
How can the concept of relevant cost help management with behavioral analyses?
It explains the assumption mat both costs and revenues are linear through the relevant range
It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.
It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions
It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action
Relevant cost refers to costs that will change depending on a specific business decision. It is crucial for decision-making as it helps management assess the financial impact of alternatives.
Relevant costs focus on future costs that differ between decision alternatives.
They help management analyze how different choices impact profitability.
This supports decision-making in areas such as pricing, outsourcing, and product discontinuation.
A. It explains the assumption that both costs and revenues are linear through the relevant range → Incorrect. While linear cost behavior is often assumed, it is not the primary purpose of relevant cost analysis.
B. It enables management to calculate a minimum number of units to produce and sell without having to incur a loss → Incorrect. This describes break-even analysis, not relevant cost analysis.
C. It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions → Incorrect. Depreciation is a sunk cost and is not considered relevant for decision-making.
The IIA’s Practice Guide: Financial Decision-Making and Internal Audit’s Role outlines how relevant cost analysis aids business strategy.
International Professional Practices Framework (IPPF) Standard 2120 states that internal auditors should assess management’s cost-analysis techniques.
Managerial Accounting Concepts (by IMA and COSO) emphasize relevant costs in strategic decision-making.
Why Option D is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is D. It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action.
Which of the following statements is true regarding user developed applications (UDAs) and traditional IT applications?
UDAs arid traditional JT applications typically follow a similar development life cycle
A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation.
Unlike traditional IT applications. UDAs typically are developed with little consideration of controls.
IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly.
User-Developed Applications (UDAs) are software tools, typically spreadsheets or small databases, created by business users rather than IT professionals. These applications often lack formal security, documentation, and control measures, increasing the risk of data errors, unauthorized access, and compliance failures.
UDAs are often created quickly to meet immediate business needs, without following IT governance, security controls, or development standards.
Unlike traditional IT applications, UDAs lack structured testing, change management, and formal documentation.
The IIA’s GTAG 14 – Auditing User-Developed Applications states that UDAs present higher risks because they are not subject to the same controls as IT-managed applications.
A. UDAs and traditional IT applications typically follow a similar development life cycle → Incorrect. Traditional IT applications follow a formal Software Development Life Cycle (SDLC), whereas UDAs are developed informally by end-users.
B. A UDA usually includes system documentation to illustrate its functions, and IT-developed applications typically do not require such documentation. → Incorrect. IT applications require extensive documentation, whereas UDAs often lack documentation entirely.
D. IT testing personnel usually review both types of applications thoroughly to ensure they were developed properly. → Incorrect. IT applications undergo rigorous testing and quality assurance, while UDAs often bypass IT reviews altogether.
IIA GTAG 14 – Auditing User-Developed Applications highlights the risks of UDAs and emphasizes the need for internal controls.
COBIT Framework (Control Objectives for Information and Related Technologies) recommends IT governance measures for all business-critical applications.
ISO 27001 (Information Security Management System) warns against uncontrolled user-developed applications due to security risks.
Why Option C is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is C. Unlike traditional IT applications, UDAs typically are developed with little consideration of controls.
Which of the following statements is true regarding a project life cycle?
Risk and uncertainty increase over the life of the project.
Costs and staffing levels are typically high as the project draws to a close.
Costs related to making changes increase as the project approaches completion.
The project life cycle corresponds with the life cycle of the product produced by or modified by the project.
Understanding the Project Life Cycle:
The project life cycle consists of initiation, planning, execution, and closure.
Early stages involve planning and defining scope, while later stages focus on execution and completion.
Why Change Costs Increase Over Time:
In early stages, changes are relatively inexpensive as they mainly involve planning adjustments.
As the project progresses, modifications require rework, additional resources, and schedule delays, increasing costs.
Near project completion, changes can be very costly, requiring significant time and effort to correct.
Why Other Options Are Incorrect:
A. Risk and uncertainty increase over time – Incorrect; risk and uncertainty decrease as the project moves forward and becomes more defined.
B. Costs and staffing levels are high at project close – Incorrect; they are usually highest during execution, not closure.
D. Project life cycle = product life cycle – Incorrect; they are separate concepts. A product may exist long after the project ends.
IIA GTAG 12 – Auditing IT Projects: Discusses project life cycle and cost implications.
IIA Practice Guide on Project Risk Management: Highlights cost escalation risks in later project phases.
PMBOK (Project Management Body of Knowledge) Framework: Defines cost increase trends in project management.
Relevant IIA References:✅ Final Answer: Costs related to making changes increase as the project approaches completion (Option C).
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
There is a higher reliance on organizational culture.
There are clear expectations set for employees.
There are electronic monitoring techniques employed.
There is a defined code for employee behavior.
Comprehensive and Detailed In-Depth Explanation:
A decentralized organizational structure distributes decision-making authority across multiple levels. This requires a strong organizational culture to guide decision-making in the absence of centralized control.
Option B (Clear expectations) – While true, this applies to both centralized and decentralized structures.
Option C (Electronic monitoring) – More common in centralized control environments.
Option D (Defined code of behavior) – Found in all organizations, not unique to decentralization.
Since decentralized organizations rely more on cultural alignment, Option A is correct.
During a payroll audit, the internal auditor is assessing the security of the local area network of the payroll department computers. Which of the following IT controls should the auditor test?
IT application-based controls
IT systems development controls
Environmental controls
IT governance controls
A rapidly expanding retail organization continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Lack of coordination among different business units
Operational decisions are inconsistent with organizational goals
Suboptimal decision-making
Duplication of business activities
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
To ensure proper segregation of duties
To create a master repository of user passwords
To enable monitoring for systems efficiencies
To enable tracking of privileges granted to users over time
What is the primary purpose of an integrity control?
To ensure data processing is complete, accurate, and authorized
To ensure data being processed remains consistent and intact
To monitor the effectiveness of other controls
To ensure the output aligns with the intended result
Which of the following IT-related activities is most commonly performed by the second line of defense?
Block unauthorized traffic.
Encrypt data.
Review disaster recovery test results.
Provide an independent assessment of IT security.
Comprehensive and Detailed In-Depth Explanation:
The Three Lines of Defense Model classifies risk management roles as follows:
First Line of Defense: Operational management responsible for risk controls (e.g., blocking unauthorized traffic, encrypting data).
Second Line of Defense: Risk management and compliance functions that monitor and assess the effectiveness of first-line controls (e.g., reviewing disaster recovery test results).
Third Line of Defense: Independent audit functions providing assurance (e.g., conducting security assessments).
Option C (Reviewing disaster recovery test results) aligns with the second line of defense because it involves oversight and evaluation of IT controls rather than direct execution.
Which of the following physical access controls is most likely to be based on the "something you have" concept?
A retina characteristics reader.
A PIN code reader.
A card-key scanner.
A fingerprint scanner.
Comprehensive and Detailed In-Depth Explanation:
Authentication methods are categorized into three factors:
Something you know (e.g., passwords, PINs).
Something you have (e.g., ID cards, key fobs, smart cards).
Something you are (e.g., biometrics like fingerprints, retina scans).
Option C (A card-key scanner) aligns with "something you have", as it requires a physical token (card) for authentication.
Option A (Retina scan) and Option D (Fingerprint scanner) fall under biometric authentication ("something you are").
Option B (PIN code reader) is based on "something you know".
Thus, C is the correct answer because a card-key represents a physical access control mechanism based on possession.
Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?
Risk tolerance.
Performance.
Threats and opportunities.
Governance.
Comprehensive and Detailed In-Depth Explanation:
Strategic initiatives are established to address emerging threats and opportunities in the business environment. Organizations continuously evaluate external and internal factors to remain competitive and mitigate risks.
Option A (Risk tolerance) influences strategy, but it is not the primary driver for creating new initiatives.
Option B (Performance) is an outcome rather than a primary driver.
Option D (Governance) provides structure but does not directly drive the need for new initiatives.
Since businesses prioritize initiatives in response to external threats and internal opportunities, option C is the correct answer.
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?
Anti-malware software
Authentication
Spyware
Rooting
How do data analysis technologies affect internal audit testing?
They improve the effectiveness of spot check testing techniques
They allow greater insight into high-risk areas
They reduce the overall scope of the audit engagement
They increase the internal auditor’s objectivity
Which of the following statements is most accurate concerning the management and audit of a web server?
The file transfer protocol (FTP) should always be enabled
The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts
The number of ports and protocols allowed to access the web server should be maximized
Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP
Which type of bond sells at a discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
High-yield bonds
Commodity-backed bonds
Zero-coupon bonds
Junk bonds
Comprehensive and Detailed In-Depth Explanation:
Zero-coupon bonds are issued at a discount to their face (par) value and do not pay periodic interest. Instead, the bond's value increases over time as it accrues interest, reaching its full face value at maturity. Investors receive the total payoff (the face value) upon maturity, which includes the initial investment plus the interest earned over the bond's term. High-yield bonds (also known as junk bonds) offer higher interest rates due to higher risk but pay periodic interest. Commodity-backed bonds are tied to commodity prices and may pay periodic interest. Therefore, zero-coupon bonds fit the described characteristics.
When using data analytics during a review of the procurement process, what is the first step in the analysis process?
Identify data anomalies and outliers
Define questions to be answered
Identify data sources available
Determine the scope of the data extract
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization’s critical data
According to Maslow’s hierarchy of needs theory, which of the following best describes a strategy where a manager offers an assignment to a subordinate specifically to support his professional growth and future advancement?
Esteem by colleagues
Self-fulfillment
Sense of belonging in the organization
Job security
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters
Orders, commands, and advice are sent to the subsidiaries from headquarters
People of local nationality are developed for the best positions within their own country
There is a significant amount of collaboration between headquarters and subsidiaries
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software.
Updating operating software in a haphazard manner.
Applying a weak password for access to a mobile device.
Jailbreaking a locked smart device.
Comprehensive and Detailed In-Depth Explanation:
Jailbreaking a locked smart device (removing manufacturer-imposed restrictions) increases the risk of infringing on copyright and privacy laws, as it allows unauthorized access to software and applications.
Option A (Not installing anti-malware software) – Increases security risks but does not directly violate regulations.
Option B (Haphazard OS updates) – Can lead to vulnerabilities but is not a legal issue.
Option C (Weak passwords) – Poses a security threat but does not impact compliance with laws.
Since jailbreaking often violates software licenses and may lead to illegal use of software, Option D is the correct answer.
An organization’s account for office supplies on hand had a balance of $9,000 at the end of year one. During year two, the organization recorded an expense for purchasing office supplies. At the end of year two, a physical count determined that the organization has $11,500 in office supplies on hand. Based on this information, what would be recorded in the adjusting entry at the end of year two?
A debit to office supplies on hand for $2,500
A debit to office supplies on hand for $11,500
A debit to office supplies on hand for $20,500
A debit to office supplies on hand for $42,500
Which of the following situations best applies to an organization that uses a project, rather than a process, to accomplish its business activities?
A clothing company designs, makes, and sells a new item
A commercial construction company is hired to build a warehouse
A city department sets up a new firefighter training program
A manufacturing organization acquires component parts from a contracted vendor
Which of the following application controls is the most dependent on the password owner?
Password selection.
Password aging.
Password lockout.
Password rotation.
Comprehensive and Detailed In-Depth Explanation:
Password selection is the most dependent on the user, as it involves choosing and setting a secure password that meets organizational security requirements.
Option B (Password aging) – Controlled by system settings, not directly by the user.
Option C (Password lockout) – Automatically triggered after failed login attempts.
Option D (Password rotation) – Enforced by system policies, not the individual user’s decision.
Since password security starts with user selection, Option A is correct.
Capital budgeting involves choosing among various capital projects to find the one(s) that will maximize a company's return on its financial investment. Which of the following parties approves the capital budget?
Board of directors.
Senior management.
Chief financial officer.
Accounting personnel.
Comprehensive and Detailed In-Depth Explanation:
Capital budgeting involves long-term investment decisions, such as purchasing new equipment, expanding facilities, or launching new products. These strategic financial decisions require approval at the highest level of governance.
The Board of Directors (Option A) is responsible for reviewing and approving capital budgets, ensuring alignment with corporate strategy.
Senior management (Option B) and the CFO (Option C) contribute by evaluating proposals, but they typically do not have final approval authority.
Accounting personnel (Option D) manage financial reporting but do not approve budgets.
Thus, the Board of Directors (A) is the correct answer.
Which of the following authentication device credentials is the most difficult to revoke when an employee's access rights need to be removed?
A traditional key lock.
A biometric device.
A card-key system.
A proximity device.
Comprehensive and Detailed In-Depth Explanation:
Biometric authentication (e.g., fingerprint, retina scan) is the most difficult to revoke because it is linked to an individual’s physical attributes, which cannot be changed like passwords or physical devices.
Option A (Traditional key lock) – Can be revoked by retrieving the key or changing the lock.
Option C (Card-key system) – Can be revoked by deactivating the card.
Option D (Proximity device) – Can be revoked by disabling the device.
Since biometric data is permanently tied to an individual, revoking access is complex, making Option B the correct answer.
According to IIA guidance, which of the following best describes an adequate management (audit) trail application control for the general ledger?
Report identifying data that is outside of system parameters.
Report identifying general ledger transactions by time and individual.
Report comparing processing results with original input.
Report confirming that the general ledger data was processed without error.
Comprehensive and Detailed In-Depth Explanation:
A management (audit) trail ensures financial transparency by tracking who initiated, approved, and processed transactions within the general ledger (GL).
Option A (Report on data outside system parameters) is a validity control, not an audit trail.
Option C (Comparison of results with input) ensures accuracy but is not a comprehensive audit trail.
Option D (Error-free processing confirmation) does not track user activity.
Since audit trails require tracking transactions by time and individual, Option B is correct.
Which of the following statements best describes the current state of data privacy regulation?
Regulations related to privacy are evolving and complex, and the number of laws is increasing
Most privacy laws are prescriptive and focused on organizations’ privacy rights
The concept of data privacy is well established, privacy regulations are mature, and minimal regulatory changes are expected
Because the concept of privacy is different around the world, data privacy is relatively unregulated
According to IIA guidance, which of the following statements is true with regard to workstation computers that access company information stored on the network?
Individual workstation computer controls are not as important as companywide server controls
Particular attention should be paid to housing workstations away from environmental hazards
Cybersecurity issues can be controlled at an enterprise level, making workstation-level controls redundant
With security risks near an all-time high, workstations should not be connected to the company network
Given the information below, which organization is in the weakest position to pay short-term debts?
Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000
Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000
Organization C: Current assets constitute $900,000; Current liabilities are $300,000
Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000
Organization A
Organization B
Organization C
Organization D
With regard to project management, which of the following statements about project crashing is true?
It leads to an increase in risk and often results in rework.
It is an optimization technique where activities are performed in parallel rather than sequentially.
It involves a revaluation of project requirements and/or scope.
It is a compression technique in which resources are added to the project.
Comprehensive and Detailed In-Depth Explanation:
Project crashing is a schedule compression technique used in project management to shorten the project duration without altering the project scope. This is achieved by allocating additional resources to critical path activities, thereby reducing their completion time. While this approach can lead to increased costs due to the added resources, it helps in meeting tight deadlines. It's important to note that crashing focuses on accelerating project timelines by adding resources, not by changing the sequence of activities (as in fast-tracking) or by reassessing project requirements. However, project crashing can increase risks and may lead to rework if not managed carefully.
Which of the following differentiates a physical access control from a logical access control?
Physical access controls secure tangible IT resources, whereas logical access controls secure software and data internal to the IT system.
Physical access controls secure software and data internal to the IT system, whereas logical access controls secure tangible IT resources.
Physical access controls include firewalls, user IDs, and passwords, whereas logical access controls include locks and security guards.
Physical access controls include input processing and output controls, whereas logical access controls include locked doors and security guards.
Comprehensive and Detailed In-Depth Explanation:
Physical access controls are security measures designed to prevent unauthorized physical access to tangible IT resources, such as computer hardware, servers, and networking equipment. Examples include locks, security guards, and biometric access systems. In contrast, logical access controls protect access to software and data within the IT system, ensuring that only authorized users can interact with digital resources. These controls include mechanisms like user IDs, passwords, firewalls, and encryption. Option A accurately captures this distinction, whereas the other options either reverse the definitions or misclassify examples of physical and logical controls.
An internal auditor is using data analytics to focus on high-risk areas during an engagement. The auditor has obtained data and is working to eliminate redundancies in the data. Which of the following statements is true regarding this scenario?
The auditor is normalizing data in preparation for analyzing it.
The auditor is analyzing the data in preparation for communicating the results.
The auditor is cleaning the data in preparation for determining which processes may be involved.
The auditor is reviewing the data prior to defining the question.
Comprehensive and Detailed In-Depth Explanation:
In data analytics, data cleaning involves identifying and correcting errors, inconsistencies, and redundancies in the dataset to ensure accuracy and reliability. By eliminating duplicate or irrelevant data, the internal auditor enhances the quality of the dataset, which is crucial for accurate analysis and risk assessment. This process is a preparatory step before analyzing the data to identify high-risk areas. Normalization (option A) refers to organizing data to reduce redundancy but is more specific to database design. Analyzing data (option B) and reviewing data prior to defining the question (option D) are steps that occur before and after data cleaning, respectively.
An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?
A star
A cash cow
A question mark
A dog
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Direct product costs
Indirect costs
Direct period costs
Indirect period costs
Which of the following types of accounts must be closed at the end of the period?
Income statement accounts.
Balance sheet accounts.
Permanent accounts.
Real accounts.
At the end of an accounting period, certain accounts must be closed to prepare financial statements and reset balances for the next period. The accounts that must be closed are temporary accounts, which include all income statement accounts (revenues, expenses, and gains/losses).
Why Option A (Income statement accounts) is Correct:
Income statement accounts (revenues, expenses, gains, and losses) are temporary accounts that track financial performance for a specific period.
At the end of the period, these accounts are closed to the retained earnings account to reset them to zero for the next period.
Why Other Options Are Incorrect:
Option B (Balance sheet accounts):
Incorrect because balance sheet accounts (assets, liabilities, and equity) are permanent accounts that carry their balances forward to the next period.
Option C (Permanent accounts):
Incorrect because permanent accounts include all balance sheet accounts, which are never closed.
Option D (Real accounts):
Incorrect because real accounts refer to balance sheet accounts (assets, liabilities, and equity), which remain open.
IIA GTAG – "Auditing Financial Close Processes": Discusses the closing of temporary accounts at the period end.
COSO Internal Control – Integrated Framework: Recommends proper financial reporting controls, including account closures.
IFRS & GAAP Accounting Standards: Define temporary and permanent accounts in financial reporting.
IIA References:Thus, the correct answer is A. Income statement accounts.
An organization decided to outsource its human resources function. As part of its process migration, the organization is implementing controls over sensitive employee data.
What would be the most appropriate directive control in this area?
Require a Service Organization Controls (SOC) report from the service provider
Include a data protection clause in the contract with the service provider.
Obtain a nondisclosure agreement from each employee at the service provider who will handle sensitive data.
Encrypt the employees ' data before transmitting it to the service provider
A directive control is a policy, procedure, or guideline that establishes expected behavior to mitigate risks. In the context of outsourcing HR functions, a data protection clause in the contract ensures that the service provider is legally obligated to protect sensitive employee data.
Legal and Regulatory Compliance – It ensures the service provider complies with GDPR, CCPA, ISO 27001, SOC 2, and other data protection laws.
Defines Security Responsibilities – Specifies encryption, access controls, data retention policies, and penalties for non-compliance.
Enforceable Accountability – The contract holds the provider accountable for data breaches or misuse.
Industry Best Practice – Most outsourcing agreements include a Data Processing Agreement (DPA) as part of contractual terms.
A. Require a SOC report – A SOC (Service Organization Control) report assesses the provider’s internal controls, but it does not enforce compliance.
C. Obtain a nondisclosure agreement (NDA) – An NDA is useful, but it only prevents individuals from sharing data; it does not define data security requirements.
D. Encrypt the employees' data before transmitting it – Encryption is a strong preventive control, but it does not provide a directive policy like a contract clause does.
IIA’s International Professional Practices Framework (IPPF) – Standard 2201 – Requires internal auditors to assess contract terms related to risk management.
COSO’s Enterprise Risk Management (ERM) Framework – Recommends contractual agreements for third-party risk mitigation.
ISO 27001 Annex A.15.1.2 – Specifies that security requirements must be addressed in supplier contracts.
Why a Data Protection Clause Is the Most Appropriate Directive Control?Why Not the Other Options?IIA References:✅ Final Answer: B. Include a data protection clause in the contract with the service provider. (Most appropriate directive control).
Which of the following best explains the matching principle?
Revenues should be recognized when earned.
Revenue recognition is matched with cash.
Expense recognition is tied to revenue recognition.
Expenses are recognized at each accounting period.
The matching principle is a fundamental accounting concept that ensures that expenses are recorded in the same period as the revenues they help generate.
Why Option C (Expense recognition is tied to revenue recognition) is Correct:
The matching principle states that expenses should be recognized in the same period as the revenue they help generate to ensure accurate financial reporting.
This principle is applied in accrual accounting under GAAP and IFRS, ensuring that expenses and revenues are properly aligned.
Why Other Options Are Incorrect:
Option A (Revenues should be recognized when earned):
This describes the revenue recognition principle, not the matching principle.
Option B (Revenue recognition is matched with cash):
Incorrect because the matching principle applies to accrual accounting, not cash accounting. Revenue can be recognized before cash is received.
Option D (Expenses are recognized at each accounting period):
Incorrect because expenses are not necessarily recognized in every period; they are matched to revenue.
IIA Practice Guide – "Auditing Financial Reporting Controls": Discusses the importance of the matching principle.
GAAP & IFRS Accounting Standards: Define and require the application of the matching principle.
COSO Internal Control Framework: Emphasizes revenue-expense alignment for accurate financial reporting.
IIA References:
Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
The spam filter removed Incoming communication that included certain keywords and domains.
The spam filter deleted commercial ads automatically, as they were recognized as unwanted.
The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.
The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
A false positive occurs when a system incorrectly identifies a legitimate item as a threat or an unwanted entity. In the case of a spam filter, a false positive happens when the filter mistakenly classifies a genuine email as spam, even though it is legitimate.
Option A: "The spam filter removed incoming communication that included certain keywords and domains."
This describes a general filtering mechanism but does not indicate a mistake. If the filter was correctly configured, it is not necessarily a false positive. (Incorrect)
Option B: "The spam filter deleted commercial ads automatically, as they were recognized as unwanted."
If the ads were indeed unwanted, this is a true positive, meaning the system worked correctly. (Incorrect)
Option C: "The spam filter routed to the 'junk' folder a newsletter that appeared to include links to fake websites."
If the newsletter contained suspicious links, the filter was functioning as designed. This is not necessarily an error. (Incorrect)
Option D: "The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday."
This is a clear example of a false positive because the email was not spam or malicious, yet the filter mistakenly blocked it. (Correct Answer)
IIA GTAG (Global Technology Audit Guide) on Cybersecurity and IT Risks: Discusses false positives and negatives in automated security controls.
IIA’s "Auditing IT Security Controls" Report: Emphasizes the need for tuning security filters to reduce false positives.
COBIT 2019 – DSS05.07 (Manage Security Services): Highlights the importance of minimizing false positives to ensure business communication is not disrupted.
Analysis of Each Option:IIA References:Thus, the correct answer is D. The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
Which of the following storage options would give the organization the best chance of recovering data?
Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.
Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.
Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.
Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.
Understanding Data Recovery and Security Risks:
Data must be protected, recoverable, and accessible when needed while maintaining security.
The best practice is to store encrypted backups offsite while keeping encryption keys separate but accessible.
Why Option D is Correct?
Storing encrypted data offsite (a few hours away) ensures protection against disasters (e.g., fire, cyberattacks, physical damage).
Keeping encryption keys at the organization ensures that recovery is quick and controlled without risking unauthorized access.
This aligns with the IIA's IT Audit Practices and ISO 27001 (Information Security Management), which emphasize separate storage of encrypted data and encryption keys for security and recoverability.
IIA Standard 2110 – Governance requires internal auditors to assess whether IT governance ensures the availability and security of critical data.
Why Other Options Are Incorrect?
Option A (Encrypted physical copies and keys stored together at the organization):
If both data and keys are in the same location, a disaster or breach would make recovery impossible.
Option B (Encrypted copies and keys stored in separate locations far away):
While secure, if encryption keys are stored too far, recovery could be delayed, impacting business continuity.
Option C (Encrypted usage reports in a cloud database):
This does not ensure full data recovery; it only provides logs and structure changes, not the actual data.
Storing encrypted data offsite while keeping encryption keys accessible onsite follows best IT security and disaster recovery practices.
IIA Standard 2110 supports evaluating IT governance, including data security and recovery controls.
Final Justification:IIA References:
IPPF Standard 2110 – Governance
ISO 27001 – Information Security Management
NIST SP 800-34 – Contingency Planning Guide for IT Systems
COBIT Framework – Data Security & Recovery Controls
Which of the following security controls focuses most on prevention of unauthorized access to the power plant?
An offboarding procedure is initiated monthly to determine redundant physical access rights.
Logs generated by smart locks are automatically scanned to identify anomalies in access patterns.
Requests for additional access rights are sent for approval and validation by direct supervisors.
Automatic notifications are sent to a central security unit when employees enter the premises during nonwork hours
Preventive security controls proactively stop unauthorized access before it occurs. The most effective method is strict access management, where new or additional access rights require formal validation before being granted.
Prevents Unauthorized Entry – Ensures that only approved personnel have access to the power plant.
Implements Segregation of Duties (SoD) – Supervisors validate access requests, reducing insider threats.
Aligns with Least Privilege Principle – Employees get only the minimum access necessary for their role.
Prevents Security Risks Before They Happen – Unlike detective or corrective controls, this method stops unauthorized access before it occurs.
A. Offboarding procedure (monthly review) – This is a detective control, identifying issues after access is granted, not preventing them.
B. Smart lock anomaly scanning – Also detective, as it identifies suspicious behavior after access has been used.
D. Automatic notifications for after-hours entry – A corrective control, responding to potential violations instead of preventing them.
IIA’s GTAG on Identity and Access Management – Recommends pre-approval processes for sensitive locations.
ISO 27001 Annex A.9 (Access Control) – Requires role-based access management for critical infrastructures.
NIST SP 800-53 (Security and Privacy Controls for Federal Information Systems) – Defines supervisor approval as a key preventive measure.
Why Approval-Based Access Control is the Best Preventive Measure?Why Not the Other Options?IIA References:
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Lower costs.
Slower decision making at the senior executive level.
Limited creative freedom in lower-level managers.
Senior-level executives more focused on short-term, routine decision making
A flatter organizational structure reduces hierarchical levels and promotes greater autonomy for employees. The primary benefit is cost reduction due to fewer management layers and streamlined decision-making.
Fewer Management Layers – Reduces the number of mid-level managers, decreasing salary expenses.
Increased Operational Efficiency – Less bureaucracy leads to faster decision-making, lowering administrative costs.
Encourages Employee Autonomy – Reduces dependence on supervision, improving productivity.
B. Slower decision-making at the senior executive level – Incorrect because flatter structures lead to faster decision-making due to fewer approval levels.
C. Limited creative freedom in lower-level managers – Incorrect because flatter structures provide more autonomy and innovation opportunities.
D. Senior-level executives more focused on short-term, routine decision-making – Incorrect because executives in a flatter structure focus on strategic, high-level decisions, delegating routine tasks.
IIA’s GTAG on Governance and Risk Management – Discusses the financial and operational impacts of different organizational structures.
COSO’s Enterprise Risk Management (ERM) Framework – Emphasizes how flatter structures reduce operational inefficiencies and costs.
COBIT 2019 (Governance Framework) – Highlights the impact of organizational structure on financial performance.
Why Lower Costs is the Correct Answer?Why Not the Other Options?IIA References:
Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?
The organization sells inventory to an overseas subsidiary at fair value.
The local subsidiary purchases inventory at a discounted price.
The organization sells inventory to an overseas subsidiary at the original cost.
The local subsidiary purchases inventory at the depreciated cost.A
Transfer pricing regulations aim to prevent tax evasion and ensure that intercompany transactions reflect fair market value, preventing profit shifting to low-tax jurisdictions. Selling inventory at fair value (arm’s length price) aligns with regulatory requirements, reducing the risk of non-compliance.
(A) Correct – The organization sells inventory to an overseas subsidiary at fair value.
Ensuring that transactions reflect fair market value prevents regulatory violations.
Adhering to the arm’s length principle minimizes transfer pricing risks and potential tax penalties.
(B) Incorrect – The local subsidiary purchases inventory at a discounted price.
A discounted price could be seen as an attempt to shift profits between entities, increasing regulatory scrutiny.
(C) Incorrect – The organization sells inventory to an overseas subsidiary at the original cost.
Selling at the original cost does not account for market conditions, potential markup, and fair valuation.
Regulators may view this as non-compliance with the arm’s length principle.
(D) Incorrect – The local subsidiary purchases inventory at the depreciated cost.
Depreciated cost may not represent fair market value and could be interpreted as a tax avoidance mechanism.
IIA’s Global Internal Audit Standards – Compliance with Tax and Transfer Pricing Regulations
Emphasizes fair pricing in intercompany transactions to prevent regulatory violations.
OECD Transfer Pricing Guidelines
Reinforces the arm’s length principle as the standard for pricing related-party transactions.
COSO’s ERM Framework – Compliance Risk Management
Highlights the need for adherence to tax laws and fair-value pricing in financial transactions.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?
Variety.
Velocity.
Volume.
Veracity.
Data governance refers to the policies, processes, and controls an organization implements to ensure data integrity, security, and compliance. When an organization has a weak data governance culture, the most compromised attribute of data is "veracity," which refers to the accuracy, reliability, and trustworthiness of data.
Why Option D (Veracity) is Correct:
Weak data governance leads to poor data quality, inconsistencies, and errors, reducing data veracity (trustworthiness and accuracy).
Without strong governance, data may be incomplete, outdated, or manipulated, leading to flawed decision-making.
Data veracity is critical for risk management, internal audit, and regulatory compliance, as unreliable data can lead to financial misstatements and operational risks.
Why Other Options Are Incorrect:
Option A (Variety):
Variety refers to different types and sources of data (structured, unstructured, semi-structured).
A weak data governance culture does not necessarily affect the diversity of data sources.
Option B (Velocity):
Velocity refers to the speed at which data is generated, processed, and analyzed.
Weak governance impacts data quality more than processing speed.
Option C (Volume):
Volume refers to the quantity of data being processed and stored.
Weak data governance might lead to data duplication or loss but does not directly impact data volume.
IIA GTAG – "Auditing Data Governance": Emphasizes the importance of data veracity in decision-making.
COSO Internal Control Framework: Highlights the role of data integrity in financial and operational controls.
IIA’s Global Technology Audit Guide on Data Analytics: Discusses the risks of poor data governance affecting veracity.
IIA References:
Which of the following best describes depreciation?
It is a process of allocating cost of assets between periods.
It is a process of assets valuation.
It is a process of accumulating adequate funds to replace assets.
It is a process of measuring decline in the value of assets because of obsolescence
Depreciation is the systematic allocation of an asset’s cost over its useful life. It reflects how much of the asset’s value is used up in each accounting period.
Spreads Cost Over Time – Instead of expensing the total cost immediately, depreciation distributes it across multiple periods.
Matches Expenses with Revenue – Ensures that the cost of long-term assets is allocated in the periods they generate revenue.
Required for Financial Reporting – Compliance with GAAP and IFRS requires proper allocation of asset costs.
B. It is a process of asset valuation – Incorrect because depreciation does not determine market value; it only spreads cost over time.
C. It is a process of accumulating adequate funds to replace assets – Incorrect because depreciation is an accounting concept, not a savings mechanism.
D. It is a process of measuring decline in the value of assets because of obsolescence – Incorrect because depreciation allocates cost, not necessarily measuring value decline (which is impairment).
IIA’s GTAG on Financial Controls and Reporting – Defines depreciation as a cost allocation method.
International Financial Reporting Standards (IFRS 16) & US GAAP (ASC 360) – State that depreciation is used to allocate asset costs over time.
COSO’s Internal Control Framework – Covers accounting treatments for fixed assets.
Why Depreciation is an Allocation Process?Why Not the Other Options?IIA References:✅ Final Answer: A. It is a process of allocating cost of assets between periods.
According to 11A guidance on IT, which of the following are indicators of poor change management?
1. Inadequate control design.
2. Unplanned downtime.
3. Excessive troubleshooting .
4. Unavailability of critical services.
2 and 3 only.
1, 2, and 3 only
1, 3, and 4 only
2, 3, and 4 only
Effective change management ensures that IT changes (such as software updates, system modifications, or infrastructure upgrades) are well-controlled, minimizing disruptions. Poor change management leads to instability, inefficiencies, and operational risks.
Unplanned Downtime (2) – Indicates that changes are being implemented without proper testing or failover planning, disrupting business operations.
Excessive Troubleshooting (3) – Suggests that changes are causing recurring issues, leading to increased workload for IT support teams.
Unavailability of Critical Services (4) – Highlights that change-related failures are affecting essential business functions, indicating improper risk assessment.
While inadequate control design is a general IT risk, it is not a direct indicator of poor change management. Instead, it relates more to weaknesses in IT governance and security frameworks.
IIA’s GTAG (Global Technology Audit Guide) on Change Management – Identifies unplanned downtime, excessive troubleshooting, and service unavailability as key red flags of poor change management.
COBIT 2019 (Governance and Management of IT) – Emphasizes structured change management to minimize disruptions.
ITIL Change Management Framework – Highlights these issues as symptoms of ineffective change control.
Why 2, 3, and 4 Are Indicators of Poor Change Management?Why Not Option 1 (Inadequate Control Design)?IIA References:✅ Final Answer: D. 2, 3, and 4 only.
Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
Assigning new roles and responsibilities for senior IT management.
Growing use of bring your own devices for organizational matters.
Expansion of operations into new markets with limited IT access.
Hiring new personnel within the IT department for security purposes.
When updating cybersecurity policies, senior management must focus on emerging risks and challenges that impact the organization’s security posture. One major concern is the increasing use of Bring Your Own Device (BYOD) policies, where employees use personal devices for work-related tasks. This introduces security vulnerabilities such as unauthorized access, data leakage, and malware infections.
(A) Incorrect – Assigning new roles and responsibilities for senior IT management.
While defining roles is important, it is a management function rather than a direct cybersecurity policy update.
Cybersecurity policies focus on risks like data protection, access controls, and device security rather than IT management roles.
(B) Correct – Growing use of bring your own devices for organizational matters.
BYOD introduces security risks such as unauthorized access, weak endpoint security, and data loss.
Cybersecurity policies must address encryption, remote access controls, and mobile device management (MDM) solutions.
(C) Incorrect – Expansion of operations into new markets with limited IT access.
While IT expansion poses challenges, cybersecurity policies focus more on data security, threat management, and risk mitigation rather than market access issues.
(D) Incorrect – Hiring new personnel within the IT department for security purposes.
Hiring staff improves security operations but is a resource management decision, not a direct cybersecurity policy concern.
Cybersecurity policies focus on access controls, risk assessments, and compliance requirements.
IIA’s GTAG (Global Technology Audit Guide) – Cybersecurity and Risk Management
Highlights BYOD as a key cybersecurity risk requiring clear policies and controls.
NIST Cybersecurity Framework – Mobile Device Security
Recommends specific policies for managing BYOD risks.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An internal auditor identified a database administrator with an incompatible dual role. Which of the following duties should not be performed by the identified administrator?
Designing and maintaining the database.
Preparing input data and maintaining the database.
Maintaining the database and providing its security,
Designing the database and providing its security
A database administrator (DBA) should not perform duties that compromise segregation of duties (SoD). A conflict arises when a DBA has both design and security responsibilities, as this creates a risk of unauthorized changes, fraud, or data breaches.
(A) Designing and maintaining the database.
Incorrect: These tasks are related but do not create a major conflict, as maintenance follows the design phase.
(B) Preparing input data and maintaining the database.
Incorrect: While data preparation is typically a business function, maintaining the database does not create a direct security risk.
(C) Maintaining the database and providing its security.
Incorrect: Maintenance involves technical upkeep, and while security controls are crucial, they do not inherently conflict.
(D) Designing the database and providing its security. (Correct Answer)
A DBA responsible for both design and security could create backdoors or override security settings, leading to potential data manipulation or fraud.
IIA Standard 2120 – Risk Management requires proper control segregation to prevent fraud and security risks.
IIA GTAG 4 – Management of IT Auditing recommends separation of design, security, and administration functions to minimize risks.
IIA Standard 2120 – Risk Management: Encourages proper separation of duties to mitigate risks.
IIA GTAG 4 – Management of IT Auditing: Recommends strict control over database access and security roles.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) because combining database design and security responsibilities creates a significant conflict of interest, increasing security risks.
An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?
he organization's operating expenses are increasing.
The organization has adopted just-in-time inventory.
The organization is experiencing inventory theft.
The organization's inventory is overstated.
A declining inventory turnover combined with an increasing gross margin rate suggests that the organization is not selling inventory as quickly as before, but still reporting higher profitability. This can indicate overstated inventory values, meaning that financial statements show higher inventory balances than what actually exists.
(A) Incorrect – The organization’s operating expenses are increasing.
Operating expenses do not directly affect inventory turnover, which measures how quickly inventory is sold.
Higher expenses could reduce net profit, but they would not explain a higher gross margin.
(B) Incorrect – The organization has adopted just-in-time (JIT) inventory.
JIT inventory systems increase inventory turnover by reducing excess stock.
Since turnover is declining, this suggests the opposite of JIT.
(C) Incorrect – The organization is experiencing inventory theft.
Inventory theft usually reduces inventory levels, potentially increasing inventory turnover due to lower stock.
Theft could lower gross margins if significant losses occur.
(D) Correct – The organization’s inventory is overstated.
Overstated inventory leads to lower COGS, artificially inflating gross margin.
If inventory levels are inflated, turnover appears lower because reported inventory is higher than actual sales justify.
IIA’s Global Internal Audit Standards – Financial Statement Audits and Fraud Risk
Covers risks related to inventory misstatements and financial fraud.
IFRS & GAAP Accounting Standards – Inventory Valuation
Defines how inventory overstatement impacts financial ratios.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following should software auditors do when reporting internal audit findings related to enterprisewide resource planning?
Draft separate audit reports for business and IT management.
Conned IT audit findings to business issues.
Include technical details to support IT issues.
Include an opinion on financial reporting accuracy and completeness.
When reporting internal audit findings related to Enterprise Resource Planning (ERP) systems, IT audit findings must be relevant to business objectives. Business leaders may not fully understand technical IT risks, so reports should translate IT risks into business impacts to ensure actionable decision-making.
(A) Draft separate audit reports for business and IT management.
Incorrect: Fragmenting reports could create misalignment, reducing the effectiveness of integrated risk management.
(B) Connect IT audit findings to business issues. (Correct Answer)
IT auditors should explain how IT risks impact operations, financial reporting, and strategic goals.
IIA Standard 2410 – Criteria for Communicating requires audit findings to be clear, relevant, and actionable for all stakeholders.
IIA GTAG 8 – Auditing Application Controls emphasizes aligning IT controls with business risks.
(C) Include technical details to support IT issues.
Incorrect: While technical details help IT teams, business executives need risk-based insights, not just technical specifics.
(D) Include an opinion on financial reporting accuracy and completeness.
Incorrect: While ERP systems impact financial data, IT auditors should focus on system risks, not directly on financial reporting opinions (which is the role of financial auditors).
IIA Standard 2410 – Criteria for Communicating: Requires clear and business-relevant communication of audit findings.
IIA GTAG 8 – Auditing Application Controls: Advises IT auditors to relate technical risks to business objectives.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because IT audit findings should be framed in a way that connects technical risks to business implications, making them more relevant to management.
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
An incorrect program fix was implemented just prior to the database backup.
The organization is preparing to train all employees on the new self-service benefits system.
There was a data center failure that requires restoring the system at the backup site.
There is a need to access prior year-end training reports for all employees in the human resources database
The most recent backup is primarily used to restore lost data in the event of a system failure, data corruption, or cyberattack. If a data center failure occurs, the latest backup is the best source to recover the human resources database and resume operations.
(A) Incorrect – An incorrect program fix was implemented just prior to the database backup.
If an incorrect fix was applied before the backup, restoring the latest backup would still contain the error.
The organization would need to restore an earlier version before the faulty update.
(B) Incorrect – The organization is preparing to train all employees on the new self-service benefits system.
The latest backup is not needed for training; the live system or historical data would be used instead.
(C) Correct – There was a data center failure that requires restoring the system at the backup site.
In the event of a system failure, restoring from the most recent backup minimizes data loss and downtime.
This is the primary reason for maintaining regular backups.
(D) Incorrect – There is a need to access prior year-end training reports for all employees in the human resources database.
Historical records would likely be stored in archived backups or reports, not the latest backup.
The most recent backup contains current data, not old reports.
IIA’s GTAG (Global Technology Audit Guide) – IT Disaster Recovery and Backup Strategies
Covers the importance of backups in system restoration.
NIST Cybersecurity Framework – Data Recovery and Business Continuity
Recommends frequent backups to protect against system failures.
ISO 22301 – Business Continuity Management
Defines recovery procedures and best practices for backup site restoration.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following is an effective preventive control for data center security?
Motion detectors.
Key card access to the facility.
Security cameras.
Monitoring access to data center workstations
A preventive control is designed to stop security breaches before they happen. In data center security, preventing unauthorized physical access is crucial.
Prevents Unauthorized Entry – Restricts access only to authorized personnel.
Tracks and Logs Access – Records who enters and exits the data center, enhancing security monitoring.
Enhances Security Layers – Often combined with biometric authentication or PINs for stronger access control.
Meets IT Security Standards – Aligns with ISO 27001, NIST, and IIA’s GTAG recommendations on physical security.
A. Motion detectors – These are detective controls, identifying movement but not preventing unauthorized access.
C. Security cameras – Also detective, as they record events but do not prevent physical breaches.
D. Monitoring access to data center workstations – This ensures data integrity but does not prevent physical access.
IIA’s GTAG (Global Technology Audit Guide) on Information Security – Recommends strong physical access controls like key cards.
NIST SP 800-53 (Security and Privacy Controls for Federal Information Systems) – Emphasizes access control as a preventive security measure.
ISO 27001 Annex A.11 (Physical and Environmental Security) – Requires access control for secure areas, including data centers.
Why Key Card Access is the Best Preventive Control?Why Not the Other Options?IIA References:
Which of the following is a sound network configuration practice to enhance information security?
Change management practices to ensure operating system patch documentation is retained.
User role requirements are documented in accordance with appropriate application-level control needs.
Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
Interfaces reinforce segregation of duties between operations administration and database development.
A sound network configuration practice should focus on enhancing security, preventing unauthorized access, and ensuring data integrity. The validation of intrusion prevention controls ensures that the network security measures function as intended and effectively protect data from threats.
(A) Change management practices to ensure operating system patch documentation is retained.
Incorrect: While maintaining patch documentation is important, change management alone does not directly enhance network security.
(B) User role requirements are documented in accordance with appropriate application-level control needs.
Incorrect: This practice improves access control and governance, but it is not a direct network security configuration practice.
(C) Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity. (Correct Answer)
Intrusion Prevention Systems (IPS) help detect and prevent malicious activities in real time.
Ensuring proper validation enhances security and prevents data corruption.
IIA GTAG 15 – Information Security Governance recommends continuous monitoring and validation of security controls.
(D) Interfaces reinforce segregation of duties between operations administration and database development.
Incorrect: Segregation of duties is a good governance practice, but it does not directly relate to network security configuration.
IIA GTAG 15 – Information Security Governance: Recommends validating security controls, including intrusion prevention systems.
IIA Standard 2120 – Risk Management: Encourages proactive security controls to prevent cyber threats.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (C) Validation of intrusion prevention controls, as it directly enhances information security by ensuring real-time threat detection and data integrity.
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?
To inform the classification of the data population.
To determine the completeness and accuracy of the data.
To identify whether the population contains outliers.
To determine whether duplicates in the data inflate the range.
When an internal auditor calculates the mean (average), median (middle value), and range (difference between highest and lowest values) of a data population, the primary purpose is to assess the distribution of data and detect anomalies. Let’s analyze the answer choices:
Option A: To inform the classification of the data population.
Incorrect. Classification typically involves categorizing data into specific groups, which requires different statistical or analytical techniques like clustering or decision trees. Mean, median, and range are more useful for identifying distribution patterns.
Option B: To determine the completeness and accuracy of the data.
Incorrect. While summary statistics can highlight extreme values, completeness and accuracy are usually assessed through data reconciliation, validation checks, and comparison with source records.
Option C: To identify whether the population contains outliers.
Correct.
The range (difference between the largest and smallest values) helps to detect extreme values.
The mean and median can show whether the data is symmetrical or skewed (which may indicate outliers).
If the mean is significantly different from the median, it suggests potential outliers pulling the average in one direction.
IIA Reference: Internal auditors use data analytics to detect anomalies and potential fraud by identifying outliers. (IIA GTAG: Auditing with Data Analytics)
Option D: To determine whether duplicates in the data inflate the range.
Incorrect. Duplicates may affect the data set, but range calculations alone do not determine whether duplicates exist. Duplicate identification usually involves checking for repeated entries, not just extreme values.
Which of the following would an organization execute to effectively mitigate and manage risks created by a crisis or event?
Only preventive measures.
Alternative and reactive measures.
Preventive and alternative measures.
Preventive and reactive measures.
To effectively mitigate and manage risks during a crisis, organizations must implement a combination of preventive and reactive measures:
Preventive measures: These are proactive steps taken before a crisis to reduce the likelihood of occurrence (e.g., risk assessments, internal controls, security protocols).
Reactive measures: These are actions taken after a crisis occurs to minimize damage, restore operations, and recover from the event (e.g., business continuity plans, incident response strategies).
(A) Incorrect – Only preventive measures.
While prevention is essential, not all crises can be avoided. Organizations also need response mechanisms.
(B) Incorrect – Alternative and reactive measures.
Alternative measures (e.g., backup systems) are part of risk management, but without prevention, risks may escalate.
(C) Incorrect – Preventive and alternative measures.
Alternative measures (e.g., backup resources) help maintain operations but do not directly address crisis response.
(D) Correct – Preventive and reactive measures.
Best practice in risk management includes both preventing crises and responding effectively when they occur.
IIA’s Global Internal Audit Standards – Crisis Management and Business Resilience
Emphasizes the need for both prevention and response strategies.
COSO’s ERM Framework – Risk Management in Crisis Situations
Recommends a combination of risk avoidance, mitigation, and crisis response.
ISO 22301 – Business Continuity Management
Highlights the importance of preventive controls and reactive response planning.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An organization created a formalized plan for a large project. Which of the following should be the first step in the project management plan?
Estimate time required to complete the whole project.
Determine the responses to expected project risks.
Break the project into manageable components.
Identify resources needed to complete the project
The first step in a project management plan is to break the project into manageable components, known as Work Breakdown Structure (WBS). This step ensures clarity, task allocation, and effective tracking.
(A) Estimate time required to complete the whole project.
Incorrect: Time estimation comes after breaking the project into smaller tasks.
(B) Determine the responses to expected project risks.
Incorrect: Risk management is important but is planned after defining project tasks and scope.
(C) Break the project into manageable components. (Correct Answer)
Dividing the project into smaller tasks (WBS) helps in resource allocation, scheduling, and risk assessment.
IIA GTAG 12 – Project Risk Management suggests using WBS to define tasks clearly.
(D) Identify resources needed to complete the project.
Incorrect: Resources can only be allocated effectively after defining project components.
IIA GTAG 12 – Project Risk Management: Recommends Work Breakdown Structure (WBS) as the first step in project planning.
PMBOK (Project Management Body of Knowledge): Defines WBS as the foundation of project planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (C) Break the project into manageable components, as this is the first step in structuring and planning a successful project.
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Requiring users to change their passwords every two years.
Requiring two-step verification for all users
Requiring the use of a virtual private network (VPN) when employees are out of the office.
Requiring the use of up-to-date antivirus, security, and event management tools.
Automated attacks that attempt to exploit weak or leaked passwords—such as credential stuffing, brute force attacks, and dictionary attacks—pose a significant cybersecurity risk. Implementing two-step verification (also known as multi-factor authentication, or MFA) is one of the most effective measures to mitigate these threats.
Why Two-Step Verification is Effective (B - Correct Answer)
Multi-factor authentication (MFA) adds an additional security layer beyond a password, requiring a second factor such as a one-time code sent to a mobile device, biometric authentication, or a security key.
Even if an attacker obtains a password, they cannot access the account without the second authentication factor.
The IIA Global Technology Audit Guide (GTAG) 1: Information Security Management emphasizes the use of multi-factor authentication to prevent unauthorized access.
Why Other Options Are Less Effective:
Option A: Changing passwords every two years
Ineffective because attackers often use compromised credentials that may be recent. Best practices recommend regular password updates but coupled with MFA.
The IIA's GTAG 16: Identity and Access Management highlights that password rotation alone does not fully protect against automated attacks.
Option C: Using a VPN when out of the office
Irrelevant to password attacks. A VPN encrypts data and secures network connections but does not prevent brute force or credential stuffing attacks.
The IIA GTAG 17: Auditing Network Security discusses VPNs for secure remote access but does not consider them a solution for password-based attacks.
Option D: Using antivirus and security tools
While important for overall security, these tools cannot prevent attacks that exploit stolen or weak passwords.
The IIA GTAG 15: Information Security Governance states that security tools should be combined with authentication controls like MFA for best protection.
GTAG 1: Information Security Management – Recommends multi-factor authentication to prevent unauthorized system access.
GTAG 16: Identity and Access Management – Highlights the limitations of password-only security and supports multi-factor authentication.
GTAG 17: Auditing Network Security – Covers VPN usage but does not consider it a solution for password attacks.
GTAG 15: Information Security Governance – Discusses the role of security tools and authentication in securing user accounts.
Step-by-Step Explanation:IIA References for Validation:Thus, requiring two-step verification (B) is the most effective control against automated password attacks.
An internal auditor is reviewing key phases of a software development project. Which of the following would; the auditor most likely use to measure the project team's performance related to how project tasks are completed?
A balanced scorecard.
A quality audit
Earned value analysis.
Trend analysis
Earned Value Analysis (EVA) is a project management technique that integrates scope, time, and cost data to measure project performance and progress objectively. EVA allows internal auditors to assess whether a software development project is on track by comparing planned work with completed work and actual costs.
Here’s why EVA is the most appropriate choice:
Evaluates Project Progress and Performance – EVA measures how much work has been completed against the planned schedule and budget, helping auditors analyze project efficiency.
Identifies Deviations – It highlights cost overruns or delays in task completion, which is critical for software development projects.
Uses Key Metrics – EVA includes essential indicators like:
Planned Value (PV) – The budgeted cost of work scheduled.
Earned Value (EV) – The value of actual work performed.
Actual Cost (AC) – The real cost incurred for work completed.
Schedule Variance (SV) and Cost Variance (CV) – Indicators of deviations from planned performance.
Supports Risk-Based Internal Audit Approach – The IIA emphasizes risk-based auditing, and EVA helps auditors assess risks related to project cost overruns, schedule slippage, and performance gaps.
A. A Balanced Scorecard – This measures overall organizational performance across perspectives (financial, customer, internal processes, and learning & growth), but it is not specifically designed for evaluating project task completion.
B. A Quality Audit – This focuses on compliance with quality standards and does not measure project task completion efficiency.
D. Trend Analysis – This evaluates patterns over time but does not provide a structured measurement of project progress in terms of cost, time, and completion percentage.
The IIA’s GTAG (Global Technology Audit Guide) on IT Project Management – Recommends using earned value analysis for project auditing.
IIA’s International Professional Practices Framework (IPPF) – Performance Standard 2120 (Risk Management) – Emphasizes the need for internal auditors to evaluate the effectiveness of project risk management, which EVA supports.
COSO’s Enterprise Risk Management (ERM) Framework – Encourages structured performance measurement techniques like EVA to monitor projects.
Why Not the Other Options?IIA References:Thus, Earned Value Analysis (EVA) is the correct answer because it provides a precise, quantitative way to measure project performance. ✅
Which of the following is a benefit from the concept of Internet of Things?
Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.
Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.
Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.
Data mining and data collection from internet and social networks is easier, and the results are more comprehensive
The Internet of Things (IoT) refers to a network of interconnected physical devices that collect and exchange data through the internet. The key benefits of IoT include automation, improved decision-making, cost savings, and efficiency gains.
(A) Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.
This is incorrect because it focuses on unauthorized access rather than a benefit of IoT. Security and monitoring are major concerns in IoT environments.
IIA Standard 2110 – Governance requires organizations to ensure adequate governance structures for IT and data security.
(B) Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs. ✅
This is correct because IoT enables smart devices to automatically adjust based on real-time data.
Example: Smart thermostats (e.g., Nest, Honeywell) use IoT to track energy prices and consumption, adjusting temperatures to optimize efficiency.
IIA Practice Guide "Assessing the Governance of Risks in IT Projects" highlights IoT as a tool for operational efficiency and cost savings.
(C) Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.
This relates more to big data and data analytics, not necessarily IoT.
IIA GTAG "Auditing IT Governance" discusses IoT in operational efficiency but distinguishes it from data extraction.
(D) Data mining and data collection from the internet and social networks is easier, and the results are more comprehensive.
This describes AI and machine learning rather than IoT, which primarily connects physical devices.
IIA GTAG "Auditing Cybersecurity Risk" highlights IoT risks but does not emphasize social media data mining.
IIA GTAG (Global Technology Audit Guide) – "Auditing IT Governance"
IIA GTAG – "Assessing the Governance of Risks in IT Projects"
IIA Standard 2110 – Governance
IIA GTAG – "Auditing Cybersecurity Risk"
Analysis of Answer Choices:IIA References:Thus, the most appropriate answer is B because IoT improves efficiency by automating energy consumption based on market conditions.
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Cold recovery plan,
Outsourced recovery plan.
Storage area network recovery plan.
Hot recovery plan
A hot recovery plan (hot site) is a fully operational, duplicate site that is pre-configured and ready for immediate use in case of a disaster. This approach allows an organization to recover critical operations quickly with minimal downtime.
(A) Cold recovery plan.
Incorrect: A cold site is a facility that has infrastructure but no active IT systems or data until set up after a disaster, resulting in longer recovery times.
(B) Outsourced recovery plan.
Incorrect: Outsourcing recovery refers to third-party disaster recovery services, but does not specifically describe a fully operational duplicate site.
(C) Storage area network recovery plan.
Incorrect: A storage area network (SAN) recovery plan focuses on data storage redundancy, not a fully operational duplicate facility.
(D) Hot recovery plan. (Correct Answer)
A hot site is the fastest and most effective disaster recovery solution, ensuring immediate failover with minimal downtime.
IIA GTAG 10 – Business Continuity Management highlights hot sites as the most effective for mission-critical operations.
IIA GTAG 10 – Business Continuity Management: Recommends hot sites for critical recovery scenarios.
IIA Standard 2120 – Risk Management: Emphasizes preparedness for disaster recovery planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) Hot recovery plan, as it ensures a fully operational backup site for immediate disaster recovery.
Which of the following best describes owner's equity?
Assets minus liabilities.
Total assets.
Total liabilities.
Owners contribution plus drawings.
Owner’s equity represents the residual interest in a company’s assets after deducting liabilities. It is a fundamental concept in financial accounting, reflecting the net worth of a business.
Formula:Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Represents the True Value of Ownership – It measures the owner's claim on the business after settling all obligations.
Directly Tied to the Accounting Equation – Assets=Liabilities+Owner’s Equity\text{Assets} = \text{Liabilities} + \text{Owner’s Equity}Assets=Liabilities+Owner’s Equity Rearranging the equation: Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Commonly Used in Financial Statements – Found in the Balance Sheet under the "Equity" section.
B. Total assets – Incorrect because assets include both owner-financed and liability-financed resources.
C. Total liabilities – Incorrect because liabilities represent debts owed, not ownership value.
D. Owner’s contribution plus drawings – Incorrect because it only considers investments and withdrawals, not retained earnings or net assets.
IIA’s GTAG on Business Financial Management – Discusses financial statement analysis, including owner’s equity.
COSO’s Internal Control – Integrated Framework – Highlights financial reporting accuracy, including equity calculations.
IFRS & GAAP Accounting Standards – Define owner’s equity as assets minus liabilities in financial reporting.
Why Option A is Correct?Why Not the Other Options?IIA References:
Which of the following techniques would best detect an inventory fraud scheme?
Analyze Invoice payments just under individual authorization limits.
Analyze stratification of inventory adjustments by warehouse location.
Analyze inventory invoice amounts and compare with approved contract amounts.
Analyze differences discovered during duplicate payment testing
Detecting an inventory fraud scheme requires analyzing patterns of inventory adjustments, particularly across different locations. Fraudulent activities often involve unauthorized write-offs, stock transfers, or misstatements of inventory levels.
(A) Analyze invoice payments just under individual authorization limits.
Incorrect: This technique is useful for detecting procurement fraud or invoice splitting, but not directly related to inventory fraud.
(B) Analyze stratification of inventory adjustments by warehouse location. (Correct Answer)
Fraudulent inventory write-offs often occur in specific warehouses or locations where controls are weak.
Stratifying inventory adjustments helps identify abnormal patterns, such as excessive losses in one location.
IIA Standard 2120 (Risk Management) recommends data analytics and trend analysis to detect anomalies.
COSO ERM – Control Activities emphasizes monitoring and review of inventory adjustments to prevent fraud.
(C) Analyze inventory invoice amounts and compare with approved contract amounts.
Incorrect: This technique is effective for detecting overbilling or procurement fraud, but not inventory fraud, which involves physical stock manipulation.
(D) Analyze differences discovered during duplicate payment testing.
Incorrect: Duplicate payment testing helps uncover billing fraud, not inventory fraud.
IIA Standard 2120 – Risk Management: Encourages fraud detection through trend analysis and data monitoring.
IIA Practice Guide – Auditing Inventory Management: Suggests stratification of inventory adjustments to identify fraud.
COSO ERM – Control Activities: Recommends monitoring inventory transactions to prevent fraud.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because analyzing stratification of inventory adjustments by warehouse location helps detect irregular patterns indicative of fraud.
Which of the following would most likely serve as a foundation for individual operational goats?
Individual skills and capabilities.
Alignment with organizational strategy.
Financial and human resources of the unit.
Targets of key performance indicators
Individual operational goals must align with an organization's overall strategy to ensure that employee efforts contribute to corporate success. Operational goals are specific, measurable objectives that support the broader strategic direction.
Why Option B (Alignment with organizational strategy) is Correct:
Organizational strategy defines the long-term vision, mission, and objectives.
Individual operational goals should align with this strategy to ensure consistency and effectiveness.
Strategic alignment ensures resources are used efficiently and performance contributes to corporate success.
Why Other Options Are Incorrect:
Option A (Individual skills and capabilities):
While important, skills alone do not define operational goals—they are tools to achieve goals.
Option C (Financial and human resources of the unit):
These resources support operational goals, but they do not serve as the foundation. Goals are set based on strategy first.
Option D (Targets of key performance indicators - KPIs):
KPIs measure performance but are not the basis for setting operational goals. Goals should align with strategy first, then KPIs track progress.
IIA Practice Guide – "Performance Management Auditing": Highlights strategic alignment as a basis for setting operational goals.
COSO ERM Framework – "Strategic and Performance Integration": Emphasizes aligning individual goals with organizational strategy.
IIA's Global Perspectives & Insights – "Auditing Organizational Performance": Discusses the role of strategy in goal-setting.
IIA References:Thus, the correct answer is B. Alignment with organizational strategy.
An internal auditor is assigned to perform data analytics. Which of the following is the next step the auditor should undertake after she has ascertained the value expected from the review?
Normalize the data,
Obtain the data
Identify the risks.Analyze the data.
When performing data analytics, the process typically follows a structured approach. Once the internal auditor has determined the expected value from the review, the next logical step is to obtain the data. Without acquiring the necessary datasets, further actions such as normalization, risk identification, and analysis cannot be effectively carried out.
(A) Incorrect – Normalize the data.
Normalization is a preprocessing step that occurs after data has been obtained.
Before normalizing, the auditor must first access and collect relevant data sources.
(B) Correct – Obtain the data.
Data acquisition is a critical step in data analytics.
The auditor must gather relevant and reliable data from internal and external sources before proceeding with further steps such as cleansing, normalization, and analysis.
(C) Incorrect – Identify the risks.
Risk identification is an essential part of the audit process but typically comes after obtaining and reviewing data patterns.
Without data, identifying risks would be speculative rather than evidence-based.
(D) Incorrect – Analyze the data.
Data analysis comes after obtaining, cleaning, and structuring the data.
Jumping straight to analysis without ensuring data quality would lead to inaccurate conclusions.
IIA’s GTAG (Global Technology Audit Guide) – Data Analytics
Recommends obtaining data as the initial step in data-driven audits.
IIA’s Global Internal Audit Standards – Use of Data Analytics in Auditing
Stresses the importance of data acquisition before proceeding with normalization and analysis.
COSO’s ERM Framework – Data-Driven Decision Making
Highlights the importance of securing data for risk identification and mitigation.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
Theory of constraints.
Just-in-time method.
Activity-based costing.
Break-even analysis
The Just-in-Time (JIT) method is a managerial accounting and inventory management strategy that focuses on reducing or eliminating excess inventory by receiving goods only as needed.
(A) Theory of constraints.
Incorrect: The theory of constraints focuses on identifying and managing bottlenecks in production, not reducing inventory levels.
(B) Just-in-time method. (Correct Answer)
JIT aims to reduce waste, lower storage costs, and improve efficiency by ensuring that materials and products arrive only when needed.
IIA GTAG 3 – Continuous Auditing suggests monitoring inventory controls to align with JIT principles.
(C) Activity-based costing.
Incorrect: Activity-based costing allocates costs to activities based on usage, not inventory reduction.
(D) Break-even analysis.
Incorrect: Break-even analysis calculates the level of sales needed to cover costs but does not focus on inventory management.
IIA Standard 2120 – Risk Management: Encourages auditors to assess cost-management strategies like JIT.
IIA GTAG 3 – Continuous Auditing: Supports real-time monitoring of inventory to minimize excess stock.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) Just-in-Time (JIT) method, as it focuses on achieving low or no inventory to optimize efficiency and reduce costs.
A company records income from an investment in common stock when it does which of the following?
Purchases bonds.
Receives interest.
Receives dividends
Sells bonds.
When a company invests in common stock, it can earn income in two primary ways:
Dividend income: When the company receives dividends, it recognizes the income.
Capital gains: When the stock is sold for a higher price than its purchase price, it results in a gain.
Why Option C (Receives dividends) is Correct:
Dividends represent income from an investment in common stock when declared and paid by the issuing company.
Under GAAP and IFRS, dividend income is recognized when received, not when declared.
Companies record dividends as investment income in their income statement.
Why Other Options Are Incorrect:
Option A (Purchases bonds):
Incorrect because purchasing bonds is an investment transaction, not income recognition.
Option B (Receives interest):
Incorrect because interest income applies to bond investments, loans, or deposits, not common stock investments.
Option D (Sells bonds):
Incorrect because selling bonds results in capital gains or losses, not regular investment income from common stock.
IIA Practice Guide – "Auditing Investment & Treasury Activities": Discusses the recognition of investment income.
IFRS 9 (Financial Instruments) & GAAP Standards: Provide guidance on recording dividends as investment income.
COSO Internal Control – Integrated Framework: Emphasizes proper financial reporting and income recognition.
IIA References:
Which of the following situations best applies to an organisation that uses a project, rather than a process, to accomplish its business activities?
Clothing company designs, makes, and sells a new item.
A commercial construction company is hired to build a warehouse.
A city department sets up a new firefighter training program.
A manufacturing organization acquires component parts from a contracted vendor
A project is a temporary initiative with a defined start and end date, specific objectives, and unique deliverables. Unlike ongoing business processes, projects have distinct goals, require coordination across various resources, and are not repeated continuously.
Let’s analyze each option:
Option A: A clothing company designs, makes, and sells a new item.
Incorrect.
While designing a new clothing item could be a project, the production and sale of the item are ongoing processes, not a one-time project.
Option B: A commercial construction company is hired to build a warehouse.
Correct.
Construction projects are classic examples of project-based work because:
They have a defined beginning and end.
They involve unique deliverables (a specific warehouse).
They require temporary coordination of resources.
IIA Reference: Internal auditors assess project management frameworks to ensure compliance with organizational and financial controls. (IIA Practice Guide: Auditing Project Management)
Option C: A city department sets up a new firefighter training program.
Incorrect.
If the training program is a one-time initiative, it could be considered a project. However, if the program is recurring (e.g., new firefighter training every year), it would be a process, not a project.
Option D: A manufacturing organization acquires component parts from a contracted vendor.
Incorrect.
Procurement of component parts is a continuous operational process, not a project.
Thus, the verified answer is B. A commercial construction company is hired to build a warehouse.
Which of the following IT-related activities is most commonly performed by the second line of defense?
Block unauthorized traffic.
Encrypt data.
Review disaster recovery test results.
Provide independent assessment of IT security.
Understanding the Three Lines of Defense Model:
First Line of Defense (Operational Management): Performs daily IT security tasks, such as blocking unauthorized traffic and encrypting data.
Second Line of Defense (Risk Management & Compliance): Monitors and reviews security controls, including disaster recovery testing and risk management activities.
Third Line of Defense (Internal Audit): Provides an independent assessment of IT security controls.
Why Option C (Review Disaster Recovery Test Results) Is Correct?
The second line of defense is responsible for monitoring and evaluating IT risk management processes, including disaster recovery and business continuity planning.
Reviewing disaster recovery test results ensures that the organization is prepared for IT disruptions and meets compliance requirements.
IIA Standard 2110 – Governance requires auditors to evaluate whether IT risk management activities (such as disaster recovery) are being effectively monitored.
Why Other Options Are Incorrect?
Option A (Block unauthorized traffic):
This is a first-line defense task, typically handled by IT security teams (e.g., firewall and intrusion detection system monitoring).
Option B (Encrypt data):
Encryption is part of daily IT security operations and is handled by the first line of defense.
Option D (Provide an independent assessment of IT security):
Independent assessments are the responsibility of internal audit (third line of defense), not the second line.
The second line of defense focuses on monitoring IT risk, making disaster recovery test review a key responsibility.
IIA Standard 2110 and the Three Lines of Defense Model confirm this role.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT Risk Management)
IIA Three Lines of Defense Model
COBIT Framework – IT Governance & Risk Management
Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Requested backup tapes were not returned from the offsite vendor In a timely manner.
Returned backup tapes from the offsite vendor contained empty spaces.
Critical systems have boon backed up more frequently than required.
Critical system backup tapes are taken off site less frequently than required
Understanding IT Backup Risks in Disaster Recovery:
Disaster recovery plans rely on backup data to restore operations after a system failure.
An ineffective backup system increases the risk of data loss, operational downtime, and regulatory non-compliance.
Why Option B (Empty Backup Tapes) Is Correct?
If backup tapes contain empty spaces, it indicates data corruption or incomplete backups, leading to unrecoverable data loss in a disaster.
IIA GTAG 16 – Data Management and IT Auditing emphasizes that backups must be tested for integrity and completeness.
ISO 27001 and NIST SP 800-34 recommend periodic verification of backup data to prevent critical failures.
Why Other Options Are Incorrect?
Option A (Delayed return of backup tapes):
While delayed tape retrieval affects recovery speed, it does not indicate data loss.
Option C (More frequent backups than required):
Frequent backups improve data protection, not cause unacceptable loss.
Option D (Less frequent offsite backups):
While infrequent backups increase risk, they do not directly indicate data loss upon testing.
Backup tapes containing empty spaces indicate potential data loss, making it the most critical disaster recovery risk.
IIA GTAG 16, ISO 27001, and NIST SP 800-34 highlight the need for validated backup integrity.
Final Justification:IIA References:
IIA GTAG 16 – Data Management and IT Auditing
ISO 27001 – Information Security Backup Standards
NIST SP 800-34 – Contingency Planning for IT Systems
During which phase of the contracting process ere contracts drafted for a proposed business activity?
Initiation phase.
Bidding phase
Development phase
Management phase
Understanding the Contracting Process PhasesThe contracting process generally follows these phases:
Initiation Phase: Identifies the need for a contract and sets initial objectives.
Bidding Phase: Potential vendors or partners submit proposals, and negotiations begin.
Development Phase: Contracts are drafted, negotiated, and finalized before execution.
Management Phase: The contract is executed, monitored, and evaluated for compliance.
Why Option C is Correct?
The development phase is where contracts are formally drafted based on agreements made during bidding and negotiation.
This phase includes legal review, compliance verification, and risk assessment, ensuring the contract aligns with business objectives and legal requirements.
IIA Standard 2110 – Governance requires auditors to assess how contract risks are managed, ensuring formal contract development processes.
Why Other Options Are Incorrect?
Option A (Initiation phase):
This phase defines the business need but does not involve drafting contracts.
Option B (Bidding phase):
In this phase, businesses solicit proposals, but contracts are not fully drafted until vendor selection.
Option D (Management phase):
The management phase involves executing and monitoring the contract, not drafting it.
Contracts are drafted during the development phase after vendor selection and before execution.
IIA Standard 2110 supports governance over contract risk and formal agreement processes.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Contract Risk & Compliance)
COSO ERM – Risk Management in Contracting
Which of the following is the best example of IT governance controls?
Controls that focus on segregation of duties, financial, and change management,
Personnel policies that define and enforce conditions for staff in sensitive IT areas.
Standards that support IT policies by more specifically defining required actions
Controls that focus on data structures and the minimum level of documentation required
IT governance controls ensure that an organization's IT systems align with business objectives, manage risks, and comply with regulatory requirements. These controls cover areas such as security, financial oversight, change management, and operational efficiency.
Let’s analyze each option:
Option A: Controls that focus on segregation of duties, financial, and change management.
Correct.
Segregation of duties (SoD) prevents conflicts of interest and reduces fraud risk.
Financial controls ensure IT expenditures align with budgets and policies.
Change management controls ensure system modifications follow formal approval and testing procedures.
These areas are core components of IT governance, ensuring security, compliance, and efficiency.
IIA Reference: Internal auditors evaluate IT governance using frameworks like COBIT (Control Objectives for Information and Related Technologies) and ISO 27001. (IIA GTAG: Auditing IT Governance)
Option B: Personnel policies that define and enforce conditions for staff in sensitive IT areas.
Incorrect.
While personnel policies support IT security, they do not fully represent IT governance controls. IT governance is broader and includes risk management, compliance, and operational efficiency.
Option C: Standards that support IT policies by more specifically defining required actions.
Incorrect.
Standards are part of IT governance but are not controls themselves. IT governance requires enforcement mechanisms like segregation of duties and change management to ensure compliance.
Option D: Controls that focus on data structures and the minimum level of documentation required.
Incorrect.
While data governance is a subset of IT governance, IT governance includes wider financial, security, and operational controls.
Thus, the verified answer is A. Controls that focus on segregation of duties, financial, and change management.
Which of the following statements. Is most accurate concerning the management and audit of a web server?
The file transfer protocol (FTP) should always be enabled.
The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.
The number of ports and protocols allowed to access the web server should be maximized.
Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.
Importance of Secure Protocols for Web Server Management:
Web servers handle sensitive data, including user credentials, financial information, and confidential communications.
Using secure protocols like HTTPS, SFTP, and TLS-encrypted SMTP ensures data is encrypted and protected from cyber threats.
Risks of Clear-Text Protocols (HTTP & FTP):
HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) transmit data in plaintext, making them vulnerable to man-in-the-middle (MITM) attacks, packet sniffing, and unauthorized access.
SFTP (Secure File Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) encrypt data, mitigating these risks.
Why Other Options Are Incorrect:
A. The file transfer protocol (FTP) should always be enabled – Incorrect.
FTP is not secure, and enabling it can expose the server to unauthorized file access and cyberattacks.
B. The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts – Incorrect.
SMTP should operate with minimal privileges to reduce security risks in case of a breach.
C. The number of ports and protocols allowed to access the web server should be maximized – Incorrect.
Minimizing open ports and protocols reduces the attack surface and limits unauthorized access.
IIA’s Perspective on IT Security and Web Server Management:
IIA Standard 2110 – Governance requires organizations to establish secure IT practices, including encryption and secure protocols.
IIA GTAG (Global Technology Audit Guide) on IT Risks emphasizes minimizing security vulnerabilities by using encrypted communication.
ISO 27001 Security Standard recommends secure transmission protocols for protecting sensitive data.
IIA References:
IIA Standard 2110 – IT Security and Governance
IIA GTAG – IT Risks and Secure Web Server Management
ISO 27001 Security Standard – Data Encryption and Secure Transmission
Thus, the correct and verified answer is D. Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP.
An internal auditor found the following information while reviewing the monthly financial siatements for a wholesaler of safety
The cost of goods sold was reported at $8,500. Which of the following inventory methods was used to derive this value?
Average cost method
First-in, first-out (FIFO) method
Specific identification method
Activity-based costing method
To determine which inventory method was used, we calculate the cost of goods sold (COGS) under different inventory valuation methods.
Opening Inventory: 1,000 units @ $2 each = $2,000
Purchased: 5,000 units @ $3 each = $15,000
Total Inventory: 6,000 units
Units Sold: 3,000 at $7 per unit
Reported COGS: $8,500
Given Data:FIFO Calculation:FIFO (First-In, First-Out) assumes that the oldest inventory is sold first.
1,000 units from opening inventory @ $2 = $2,000
2,000 units from purchases @ $3 = $6,000
Total COGS under FIFO: $2,000 + $6,000 = $8,000
Average Cost Calculation:Average cost per unit =
Total Cost of InventoryTotal Units=(2,000+15,000)6,000=17,0006,000=2.83 per unit\frac{\text{Total Cost of Inventory}}{\text{Total Units}} = \frac{(2,000 + 15,000)}{6,000} = \frac{17,000}{6,000} = 2.83 \text{ per unit}Total UnitsTotal Cost of Inventory=6,000(2,000+15,000)=6,00017,000=2.83 per unit
COGS using average cost method: 3,000×2.83=8,4903,000 \times 2.83 = 8,4903,000×2.83=8,490 This is not an exact match to the reported COGS of $8,500.
Since the closest method to the reported value is FIFO ($8,000 vs. $8,500 reported COGS, accounting for possible rounding errors or additional costs), FIFO is the most likely method used.
(A) Average cost method. ❌ Incorrect. The calculated COGS using the weighted average method was $8,490, which does not match exactly with the reported COGS of $8,500.
(B) First-in, first-out (FIFO) method. ✅ Correct. The FIFO method yielded $8,000, which is the closest match to the reported COGS. Minor rounding adjustments or other expenses could explain the difference of $500.
(C) Specific identification method. ❌ Incorrect. This method applies when each inventory item is individually tracked, which is not mentioned in the question.
(D) Activity-based costing method. ❌ Incorrect. Activity-based costing (ABC) is used for overhead allocation and is not a primary inventory valuation method.
IIA GTAG – "Auditing Inventory Management"
IIA Standard 2130 – Control Activities (Inventory and Costing Methods)
GAAP and IFRS – FIFO, Weighted Average, and Specific Identification Methods
Analysis of Answer Choices:IIA References:Thus, the correct answer is B (FIFO method) because it provides the closest cost match to the reported COGS.
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
Compliance.
Privacy
Strategic
Physical security
Understanding Mobile Device Risks in an Organization:
When an organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems, it introduces significant compliance risks.
These risks include violations of regulatory requirements, industry standards, and internal security policies.
Compliance Risks in Smart Device Usage:
Unauthorized Access: External users may bypass security controls, leading to data breaches or regulatory non-compliance (e.g., GDPR, HIPAA, or PCI-DSS violations).
Lack of Encryption and Data Protection: If smart devices access sensitive information without proper security protocols, the organization may fail to comply with industry regulations.
Failure to Enforce Mobile Device Management (MDM): Without proper policy enforcement, organizations risk failing audits and facing penalties.
Why Other Options Are Incorrect:
B. Privacy:
Privacy concerns relate to handling personal data, but in this scenario, the focus is on third-party access risks, which fall under compliance.
C. Strategic:
Strategic risks relate to long-term business objectives, whereas compliance risks are more immediate and regulatory in nature.
D. Physical security:
Physical security deals with preventing unauthorized access to buildings or devices, not cybersecurity risks from external smart devices.
IIA’s Perspective on Compliance and IT Security:
IIA Standard 2110 – Governance emphasizes the need to evaluate IT security risks, including third-party access risks.
IIA GTAG (Global Technology Audit Guide) on IT Risks highlights compliance risks in Bring Your Own Device (BYOD) and third-party access policies.
ISO 27001 Information Security Standard mandates controls to manage external device access risks.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – IT Risks and BYOD Policies
ISO 27001 Information Security Standard
NIST Cybersecurity Framework for Mobile Device Security
Thus, the correct and verified answer is A. Compliance.
An organization and its trading partner rely on a computer-to-computer exchange of digital business documents. Which of the following best describes this scenario?
Use of a central processing unit
Use of a database management system
Use of a local area network
Use of electronic data Interchange
Electronic Data Interchange (EDI) refers to the computer-to-computer exchange of business documents (such as purchase orders, invoices, and shipping notices) in a standard electronic format between business partners.
Correct Answer (D - Use of Electronic Data Interchange)
EDI enables real-time, automated business transactions between companies, reducing errors and increasing efficiency.
The IIA GTAG 8: Audit of Inventory Management highlights EDI as a critical system for supply chain and procurement operations.
Why Other Options Are Incorrect:
Option A (Use of a Central Processing Unit - CPU):
A CPU is a hardware component, not a method for exchanging business documents.
Option B (Use of a Database Management System - DBMS):
A DBMS stores and manages data but does not facilitate external document exchange between trading partners.
Option C (Use of a Local Area Network - LAN):
A LAN connects computers within an organization but does not enable document exchange between separate businesses.
IIA GTAG 8: Audit of Inventory Management – Discusses EDI as an essential tool for automating business transactions.
IIA Practice Guide: Auditing IT Controls – Recommends EDI for secure and efficient document exchange.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because EDI is the best system for automated, computer-to-computer business document exchange.
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
Tampering
Hacking
Phishing
Piracy
Hacking refers to unauthorized access to an IT system, typically with the intent to disrupt, steal, or manipulate data. In this scenario, activists attacking an oil company's IT system as a protest falls under hacking because they are illegally breaking into the company’s digital infrastructure to make a statement.
Let’s analyze each option:
Option A: Tampering
Incorrect. Tampering refers to physically altering or interfering with a system (e.g., changing sensor readings in an oil rig), rather than attacking an IT system digitally.
Option B: Hacking
Correct.
The individuals are gaining unauthorized access to the company’s IT system.
This action is commonly associated with hacktivism, where hackers attack organizations for political or ideological reasons.
IIA Reference: Internal auditors assess cybersecurity threats, including hacking and unauthorized access risks. (IIA GTAG: Auditing Cybersecurity Risks)
Option C: Phishing
Incorrect. Phishing involves tricking individuals into revealing sensitive information (e.g., login credentials) through fraudulent emails or websites, but this scenario describes a direct attack on the IT system.
Option D: Piracy
Incorrect. Piracy typically refers to copyright infringement (e.g., unauthorized software use) rather than hacking an IT system.
Thus, the verified answer is B. Hacking.
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An extranet
A local area network
An Intranet
The internet
An Intranet is a private network that is accessible only to an organization’s personnel. It is used for internal communication, data sharing, and collaboration while ensuring security and restricted access.
Let’s analyze each option:
Option A: An extranet
Incorrect. An extranet extends an organization’s internal network to external parties such as vendors, suppliers, or business partners. Since the organization wants to allow access only to its personnel, an extranet is not the right choice.
Option B: A local area network (LAN)
Incorrect. While a LAN is a network within a limited geographic area (such as an office), it does not necessarily restrict access only to personnel. Additionally, an intranet operates over a LAN but includes access controls and authentication mechanisms.
Option C: An Intranet
Correct. An intranet is specifically designed for internal use, allowing employees to securely share documents, collaborate, and access internal resources. Organizations can implement access control mechanisms to restrict access to authorized personnel only.
IIA Reference: Internal auditors assess IT security to ensure that internal networks (such as intranets) have appropriate access restrictions to protect sensitive data. (IIA GTAG: Auditing IT Networks)
Option D: The internet
Incorrect. The internet is a public network that does not restrict access. Using the internet for internal communication would expose sensitive data to external threats.
Thus, the verified answer is C. An Intranet.
According to IIA guidance on IT, which of the following best describes a situation where data backup plans exist to ensure that critical data can be restored at some point in the future, but recovery and restore processes have not been defined?
Hot recovery plan
Warm recovery plan
Cold recovery plan
Absence of recovery plan
A disaster recovery plan (DRP) ensures that critical systems and data can be restored after an incident. If backup plans exist but no recovery and restore processes are defined, then the organization lacks a functional recovery plan altogether.
(A) Hot recovery plan.
Incorrect. A hot recovery plan includes real-time data replication and immediate failover systems, allowing for almost instant recovery in case of an outage. Since the scenario mentions that no restore process is defined, this cannot be a hot recovery plan.
(B) Warm recovery plan.
Incorrect. A warm recovery plan involves regular backups and a standby system that can be activated within hours or days. However, without defined restore procedures, the organization does not even have a warm recovery plan.
(C) Cold recovery plan.
Incorrect. A cold recovery plan means that backups exist but recovery takes significant time because systems and infrastructure need to be rebuilt. However, a cold plan still includes a recovery process, which the scenario lacks.
(D) Absence of recovery plan. ✅
Correct. If data backup plans exist but no restore processes are defined, then there is no functional recovery plan. Without a structured approach to data recovery, backups alone are useless in an actual disaster scenario.
IIA GTAG "Business Continuity and Disaster Recovery" highlights the need for detailed recovery processes as part of an overall disaster recovery plan.
IIA GTAG – "Business Continuity and Disaster Recovery"
IIA Standard 2120 – Risk Management
COBIT Framework – IT Disaster Recovery Controls
Analysis of Answer Choices:IIA References:Thus, the correct answer is D, as data backups without recovery procedures indicate the absence of a recovery plan.
Which of the following should be included in a data privacy poky?
1. Stipulations for deleting certain data after a specified period of time.
2. Guidance on acceptable methods for collecting personal data.
3. A requirement to retain personal data indefinitely to ensure a complete audit trail,
4. A description of what constitutes appropriate use of personal data.
1 and 2 only
2 and 3 only
1, 2 and 4 only
2, 3, and 4 only
A data privacy policy outlines how an organization collects, stores, processes, and protects personal data. It should comply with global data protection regulations such as GDPR, CCPA, and IIA guidelines on data security.
(1) Stipulations for deleting certain data after a specified period of time. ✅
Correct. Many data protection laws (e.g., GDPR Article 5) require organizations to delete personal data after a defined retention period to reduce data breach risks.
(2) Guidance on acceptable methods for collecting personal data. ✅
Correct. A privacy policy must define legal and ethical ways to collect personal data (e.g., user consent, lawful processing).
(3) A requirement to retain personal data indefinitely to ensure a complete audit trail. ❌
Incorrect. Retaining personal data indefinitely violates most data privacy regulations (e.g., GDPR Right to Be Forgotten). Data must be stored only for as long as necessary.
(4) A description of what constitutes appropriate use of personal data. ✅
Correct. A privacy policy should clearly define how collected data can and cannot be used to prevent misuse and ensure compliance.
IIA GTAG – "Auditing Privacy Risks"
IIA Standard 2110 – Governance (Data Protection & Privacy)
GDPR (General Data Protection Regulation) – Articles 5 & 17 (Data Retention & Deletion)
Analysis of Answer Choices:IIA References:Thus, the correct answer is C (1, 2, and 4 only) because data should not be retained indefinitely, and the policy must include data collection, retention, and appropriate usage guidelines.
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Cost of sales and net income are understated.
Cost of sales and net income are overstated.
Cost of sales is understated and not income is overstated.
Cost of sales is overstated and net Income is understated.
When inventory is understated (not included in the physical count) at year-end, the financial impact affects both cost of sales (COGS) and net income as follows:
Correct Answer (C - Cost of Sales is Understated and Net Income is Overstated)
The ending inventory is part of the formula used to calculate the cost of goods sold (COGS): COGS=BeginningInventory+Purchases−EndingInventoryCOGS = Beginning Inventory + Purchases - Ending InventoryCOGS=BeginningInventory+Purchases−EndingInventory
If ending inventory is understated, then:
COGS will be understated (because inventory that should have been counted as sold was omitted).
Net income will be overstated because COGS is lower than it should be, making profits appear higher.
This error causes financial misstatements, violating IIA auditing standards for financial accuracy.
Why Other Options Are Incorrect:
Option A (Cost of sales and net income are understated):
Net income would not be understated—it would be overstated because the cost of goods sold is too low.
Option B (Cost of sales and net income are overstated):
COGS would be understated, not overstated. If COGS were overstated, net income would be understated.
Option D (Cost of sales is overstated and net income is understated):
The opposite happens—COGS is understated and net income is overstated.
IIA GTAG 8: Audit of Inventory Management – Covers financial impact of inventory misstatements.
IIA Practice Guide: Auditing Financial Statements – Addresses common inventory errors and financial reporting impacts.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because an understated inventory reduces COGS and inflates net income.
Which of the following principles s shared by both hierarchies and open organizational structures?
1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. Employees at all levels should be empowered to make decisions.
1 and 3 only
1 and 4 only
2 and 3 only
3 and 4 only
Both hierarchies (traditional organizations with a clear chain of command) and open organizational structures (flatter, decentralized decision-making models) share certain fundamental management principles.
Let’s analyze each statement:
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
Correct. In both hierarchical and open structures, managers can delegate decision-making authority, but they remain accountable for the outcomes.
IIA Reference: Internal auditors assess governance structures to ensure that accountability remains with senior management, even when authority is delegated. (IIA Standard 2110: Governance)
A supervisor's span of control should not exceed seven subordinates.
Incorrect. While some management theories suggest an ideal span of control, there is no universal limit of seven subordinates. The optimal number depends on factors like task complexity and organizational structure.
Responsibility should be accompanied by adequate authority.
Correct. Employees must have the necessary authority to fulfill their responsibilities effectively, regardless of the organizational structure.
IIA Reference: The IIA’s guidelines on effective governance and accountability emphasize the need for clear delegation of authority to ensure operational efficiency. (IIA Practice Guide: Organizational Governance)
Employees at all levels should be empowered to make decisions.
Incorrect. While this principle applies to open organizational structures, it does not align with traditional hierarchies, where decision-making authority is concentrated at higher levels.
Thus, the verified answer is A. 1 and 3 only.
While auditing an organization's customer call center, an internal auditor notices that Key performance indicators show a positive trend, despite the fact that there have been increasing customer complaints over the same period. Which of the following audit recommendations would most likely correct the cause of this inconsistency?
Review the call center script used by customer service agents to interact with callers, and update the script if necessary.
Be-emphasize the importance of call center employees completing a certain number of calls per hour.
Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve.
Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily
Understanding the Call Center Performance Issue:
The key performance indicators (KPIs) show a positive trend, meaning the call center appears to be performing well.
However, customer complaints are increasing, indicating that the KPIs are not accurately reflecting service quality.
This suggests that employees may be prioritizing call quantity over call quality, likely due to pressure to meet call quotas.
Why De-Emphasizing Call Quotas is the Best Solution:
Encourages Quality Over Speed: Reducing the emphasis on call volume allows agents to spend more time resolving customer issues effectively.
Improves Customer Satisfaction: Agents can provide more thorough assistance, reducing repeat calls and complaints.
Aligns KPIs with Service Quality: Shifting focus from quantity-based KPIs to quality-based KPIs ensures performance measurements reflect actual customer experience.
Why Other Options Are Incorrect:
A. Review the call center script used by customer service agents to interact with callers, and update the script if necessary – Incorrect.
While updating scripts may help, it does not address the root issue of employees rushing through calls to meet quotas.
C. Retrain call center staff on area processes and common technical issues that they will likely be asked to resolve – Incorrect.
Training is useful, but if agents are pressured to complete calls quickly, training alone will not resolve the issue.
D. Increase the incentive for call center employees to complete calls quickly and raise the number of calls completed daily – Incorrect.
This would worsen the issue by further incentivizing speed over customer satisfaction, leading to more complaints.
IIA’s Perspective on Performance Metrics and Customer Service Quality:
IIA Standard 2120 – Risk Management requires organizations to ensure that performance metrics align with actual business objectives.
IIA GTAG (Global Technology Audit Guide) on Performance Measurement recommends balancing quantitative KPIs (e.g., call volume) with qualitative KPIs (e.g., customer satisfaction scores).
COSO Internal Control Framework supports adjusting performance incentives to ensure alignment with business objectives.
IIA References:
IIA Standard 2120 – Risk Management & KPI Alignment
IIA GTAG – Performance Metrics in Customer Service
COSO Internal Control Framework – Effective KPI Design
Thus, the correct and verified answer is B. De-emphasize the importance of call center employees completing a certain number of calls per hour.
Which of the following physical access control is most likely to be based on ’’something you have" concept?
A retina characteristics reader
A P3M code reader
A card-key scanner
A fingerprint scanner
Understanding the "Something You Have" Concept:
Access control methods are classified into three main authentication factors:
Something You Know – Passwords, PINs, security questions.
Something You Have – Physical devices like keycards, smart cards, or security tokens.
Something You Are – Biometrics such as fingerprints, retina scans, or voice recognition.
Why a Card-Key Scanner is the Correct Answer:
A card-key scanner verifies access using a physical card, which aligns with the "something you have" authentication factor.
Users must possess the key card to gain entry, making it a classic example of physical token-based security.
Why Other Options Are Incorrect:
A. A retina characteristics reader – Incorrect, as retina scans fall under "something you are" (biometrics), not "something you have".
B. A PIN code reader – Incorrect, as PIN codes are "something you know", not a physical possession.
D. A fingerprint scanner – Incorrect, as fingerprints are biometric ("something you are"), not a physical object.
IIA’s Perspective on Physical Security Controls:
IIA Standard 2110 – Governance emphasizes the importance of using multi-factor authentication to enhance security.
IIA GTAG (Global Technology Audit Guide) on Access Control recommends the use of physical security devices like card-key scanners to prevent unauthorized access.
ISO 27001 Information Security Standard identifies "something you have" authentication methods as critical components of access control.
IIA References:
IIA Standard 2110 – Governance & IT Security
IIA GTAG – Physical Security & Access Controls
ISO 27001 Information Security Standard – Multi-Factor Authentication
Thus, the correct and verified answer is C. A card-key scanner.
A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Compare to the annual cost of capital
Compare to the annual interest data.
Compare to the required rate of return.
Compare to the net present value.
The internal rate of return (IRR) is a measure used to evaluate the profitability of an investment. The project is considered acceptable if its IRR is greater than or equal to the required rate of return (RRR), which is the minimum return an organization expects from an investment.
Correct Answer (C - Compare to the Required Rate of Return)
The required rate of return (RRR) represents the minimum acceptable return for the project.
If IRR ≥ RRR, the project is acceptable. If IRR < RRR, the project is rejected.
The IIA Practice Guide: Auditing Capital Investments suggests comparing IRR to the RRR to ensure financial feasibility.
Why Other Options Are Incorrect:
Option A (Compare to the annual cost of capital):
The cost of capital (WACC - Weighted Average Cost of Capital) is an important factor, but RRR is the direct benchmark for IRR comparison.
Option B (Compare to the annual interest rate):
Interest rates do not determine project feasibility—they only affect financing costs.
Option D (Compare to the net present value - NPV):
NPV and IRR are related, but they serve different purposes.
IRR is compared against RRR, while NPV measures absolute profitability in dollar terms.
IIA Practice Guide: Auditing Capital Investments – Discusses IRR, RRR, and investment decision-making.
IIA GTAG 3: Business Case Development – Explains how financial metrics like IRR and RRR are used in decision-making.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because IRR should be compared to the required rate of return to determine project acceptability.
An organization's account for office supplies on hand had a balance of $9,000 at the end of year one. During year two. The organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11 ,500 in office supplies on hand. Based on this Information, what would he recorded in the adjusting entry an the end of year two?
A debit to office supplies on hand for S2.500
A debit to office supplies on hand for $11.500
A debit to office supplies on hand for $20,500
A debit to office supplies on hand for $42,500
Understanding the Accounting for Office Supplies:
The organization maintains an account for office supplies on hand, which represents unused office supplies at any given time.
The expense recorded during the year represents the cost of office supplies purchased.
At year-end, the adjusting entry is made to reflect the actual amount of supplies on hand and adjust the supplies expense accordingly.
Formula to Determine the Supplies Used:
Supplies Used=Beginning Balance+Purchases−Ending Balance\text{Supplies Used} = \text{Beginning Balance} + \text{Purchases} - \text{Ending Balance}Supplies Used=Beginning Balance+Purchases−Ending Balance
Plugging in the given values:
Supplies Used=9,000+45,000−11,500=42,500\text{Supplies Used} = 9,000 + 45,000 - 11,500 = 42,500Supplies Used=9,000+45,000−11,500=42,500
This amount ($42,500) represents the actual office supplies used and should be recorded as an expense.
The adjusting entry would include:
A debit to Office Supplies on Hand for $42,500
A credit to Office Supplies Expense for $42,500
Why Other Options Are Incorrect:
A. A debit to office supplies on hand for $2,500 – Incorrect, as this figure does not represent supplies used or purchased.
B. A debit to office supplies on hand for $11,500 – Incorrect, as this is the ending balance and not the adjustment amount.
C. A debit to office supplies on hand for $20,500 – Incorrect, as this does not align with the formula for calculating used supplies.
IIA’s Perspective on Financial Reporting and Adjusting Entries:
IIA Standard 1220 – Due Professional Care emphasizes accurate financial reporting and proper adjustments for year-end entries.
GAAP Accounting Principles require accrual-based adjustments to ensure that expenses are recognized in the period they are incurred.
COSO Internal Control Framework supports proper inventory and expense adjustments to avoid misstated financials.
IIA References:
IIA Standard 1220 – Due Professional Care (Financial Reporting Accuracy)
GAAP Accounting Standards – Adjusting Entries for Supplies and Inventory
COSO Internal Control – Accurate Expense Recognition
Thus, the correct and verified answer is D. A debit to office supplies on hand for $42,500.
Which of the following is a disadvantage in a centralized organizational structure?
Communication conflicts
Slower decision making.
Loss of economies of scale
Vulnerabilities in sharing knowledge
A centralized organizational structure concentrates decision-making authority at the top levels of management. While this ensures control and consistency, it can lead to slower decision-making due to the need for approvals from higher levels.
Let’s analyze each option:
Option A: Communication conflicts.
Incorrect.
Centralized structures generally have clear lines of authority and communication, reducing conflicts.
Communication conflicts are more common in decentralized structures where multiple decision-makers exist.
Option B: Slower decision making.
Correct.
Since all decisions must pass through top management, it delays responses to market changes and reduces flexibility.
Lower-level employees have less authority to make operational decisions, leading to bottlenecks.
IIA Reference: Internal auditors assess organizational governance, including decision-making efficiency in centralized vs. decentralized structures. (IIA Practice Guide: Organizational Governance)
Option C: Loss of economies of scale.
Incorrect.
Centralization improves economies of scale by standardizing processes and consolidating resources.
Decentralization (not centralization) is more likely to lead to duplication of efforts and a loss of economies of scale.
Option D: Vulnerabilities in sharing knowledge.
Incorrect.
Centralized organizations tend to have structured knowledge-sharing frameworks, such as standardized policies and corporate training programs.
Which of the following scenarios best illustrates a spear phishing attack?
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
A person posing as a representative of the company’s IT help desk called several employees and played a generic prerecorded message requesting password data.
A person received a personalized email regarding a golf membership renewal, and he click a hyperlink to enter his credit card data into a fake website
Many users of a social network service received fake notifications of e unique opportunity to invest in a new product.
Understanding Spear Phishing Attacks:
Spear phishing is a targeted cyberattack where attackers send personalized emails to trick individuals into providing sensitive data (e.g., passwords, financial information).
Unlike regular phishing, which casts a wide net, spear phishing is highly customized and often appears to come from a trusted source.
Why Option C Is Correct?
The scenario describes a highly personalized email (related to a golf membership) that tricks the recipient into clicking a malicious hyperlink and entering sensitive data.
This matches the definition of a spear phishing attack, where an attacker tailors a scam specifically for an individual.
IIA GTAG 16 – Data Analytics and ISO 27001 emphasize the need for security awareness training to mitigate such threats.
Why Other Options Are Incorrect?
Option A (Website attack causing a server crash):
This describes a Denial-of-Service (DoS) attack, not spear phishing.
Option B (Generic recorded message requesting password data):
This is vishing (voice phishing), not spear phishing. Spear phishing relies on personalized emails.
Option D (Fake social media investment opportunity):
This describes mass phishing, which targets multiple users, unlike spear phishing, which is highly targeted.
Spear phishing is a targeted attack that uses personal details to deceive individuals, making option C the best choice.
IIA GTAG 16 and ISO 27001 emphasize cybersecurity awareness to prevent such attacks.
Final Justification:IIA References:
IIA GTAG 16 – Data Analytics in Cybersecurity Audits
ISO 27001 – Cybersecurity Best Practices
NIST SP 800-61 – Incident Response Guidelines for Phishing Attacks
The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
1. Favorable labor efficiency variance.
2. Adverse labor rate variance.
3. Adverse labor efficiency variance.
4. Favorable labor rate variance.
1 and 2
1 and 4
3 and A
2 and 3
Understanding Labor Variances in Cost Accounting:
Labor efficiency variance measures the difference between the actual hours worked and the standard hours allowed for actual production.
Labor rate variance measures the difference between the actual labor cost per hour and the standard rate set for labor.
Why Options 1 (Favorable Labor Efficiency Variance) and 2 (Adverse Labor Rate Variance) Are Correct?
Favorable Labor Efficiency Variance (1):
Hiring more experienced researchers should lead to higher productivity, meaning that the team completes tasks faster, reducing the total labor hours required.
This results in a favorable labor efficiency variance because less time is spent on the project than initially expected.
Adverse Labor Rate Variance (2):
More experienced employees command higher salaries, leading to an increase in labor costs per hour compared to the budgeted rate.
This results in an adverse labor rate variance because the actual wage rate exceeds the standard rate.
Why Other Options Are Incorrect?
Option 3 (Adverse Labor Efficiency Variance):
This would occur if the new hires were less productive, which contradicts the scenario.
Option 4 (Favorable Labor Rate Variance):
A favorable variance in labor rate occurs when labor costs are lower than expected, which is unlikely when hiring more experienced (higher-paid) employees.
Hiring more experienced employees improves efficiency (favorable efficiency variance) but increases wages (adverse rate variance).
IIA Standard 1220 – Due Professional Care requires auditors to consider operational efficiency in decision-making evaluations.
Final Justification:IIA References:
IPPF Standard 1220 – Due Professional Care
IIA Practice Guide – Assessing Business Performance Metrics
According to Herzberg's Two-Factor Theory of Motivation, which of the following factors arc mentioned most often by satisfied employees?
Salary and status
Responsibility and advancement
Work conditions and security
Peer relationships and personal life
Herzberg’s Two-Factor Theory of Motivation identifies two categories of workplace factors:
Hygiene Factors – Prevent dissatisfaction but do not create motivation (e.g., salary, job security, work conditions).
Motivational Factors – Lead to job satisfaction and motivation (e.g., achievement, responsibility, advancement, recognition).
(A) Salary and status. ❌ Incorrect.
Salary is a hygiene factor, meaning it prevents dissatisfaction but does not directly drive job satisfaction.
Status is also not a strong motivator under Herzberg’s theory.
(B) Responsibility and advancement. ✅ Correct.
These are motivational factors in Herzberg’s theory.
Employees feel satisfied when they have responsibility, career growth, and promotion opportunities.
IIA GTAG "Auditing Human Resource Management" highlights career development as a key driver of employee motivation and retention.
(C) Work conditions and security. ❌ Incorrect.
These are hygiene factors, which help avoid dissatisfaction but do not actively motivate employees.
(D) Peer relationships and personal life. ❌ Incorrect.
Good relationships with coworkers help, but they are not primary motivators under Herzberg’s theory.
IIA GTAG – "Auditing Human Resource Management"
IIA Standard 2110 – Governance (Employee Motivation & Engagement)
Herzberg’s Two-Factor Theory of Motivation (Workplace Psychology Research)
Analysis of Answer Choices:IIA References:Thus, the correct answer is B, as responsibility and advancement are the key motivational factors leading to employee satisfaction.
Which of the following best explains why an organization would enter into a capital lease contract?
To increase the ability to borrow additional funds from creditors
To reduce the organization's free cash flow from operations
To Improve the organization's free cash flow from operations
To acquire the asset at the end of the lease period at a price lower than the fair market value
A capital lease (now referred to as a finance lease under IFRS 16 and ASC 842) is a leasing arrangement where an organization records the leased asset and liability on its balance sheet as if it were owned. Organizations enter into capital leases to improve financial metrics, including free cash flow from operations.
Let’s analyze each option:
Option A: To increase the ability to borrow additional funds from creditors
Incorrect. A capital lease creates a liability on the balance sheet, which may reduce borrowing capacity rather than increase it.
Option B: To reduce the organization's free cash flow from operations
Incorrect.
Operating leases impact operating cash flow because lease payments are treated as operating expenses.
Capital leases (finance leases) shift payments to financing activities, improving operating cash flow since lease obligations are classified as debt.
Option C: To improve the organization's free cash flow from operations
Correct.
Capital lease payments are classified under financing activities rather than operating activities, which increases free cash flow from operations.
This improves financial ratios and liquidity metrics, making the organization appear more attractive to investors.
IIA Reference: Internal auditors assess lease accounting and financial reporting impacts under IFRS 16 (Leases) and ASC 842 (Leases). (IIA Practice Guide: Auditing Financial Reporting Risks)
Option D: To acquire the asset at the end of the lease period at a price lower than the fair market value
Incorrect. While some capital leases include a bargain purchase option, the primary reason for entering into a capital lease is financial reporting benefits, not necessarily acquiring the asset.
Thus, the verified answer is C. To improve the organization's free cash flow from operations.
Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?
Higher cash flow and treasury balances.
Higher inventory balances
Higher accounts receivable.
Higher accounts payable
Understanding E-Commerce Systems and Their Financial Impact
E-commerce systems, including electronic data interchange (EDI) and electronic funds transfer (EFT), streamline procurement and payment processes.
The main financial effect of implementing such a system is the acceleration of accounts payable transactions.
This is because automated purchasing systems allow businesses to place orders faster and in larger volumes, leading to an increase in outstanding liabilities (accounts payable) before payments are settled.
Why Option D is Correct?
Higher accounts payable occur because:
EDI automates order placement, leading to more frequent and possibly larger purchases before payments are processed.
EFT may improve payment processing speed, but it does not eliminate outstanding payables immediately.
Suppliers may extend credit terms, increasing the organization's short-term liabilities under accounts payable.
IIA Standard 2110 – Governance requires internal auditors to evaluate how technology changes impact financial controls, including accounts payable management.
COBIT 5 Framework – AP Processes emphasizes that auditors should monitor financial system integration risks, including liabilities like accounts payable.
Why Other Options Are Incorrect?
Option A (Higher cash flow and treasury balances):
E-commerce improves transaction efficiency but does not necessarily increase cash flow. It may even reduce available cash due to frequent automated purchases.
Option B (Higher inventory balances):
EDI can reduce inventory levels due to just-in-time (JIT) ordering, rather than increasing them.
Option C (Higher accounts receivable):
Accounts receivable refers to money owed to the organization, but e-commerce impacts payables (money owed by the organization) more directly.
E-commerce accelerates order processing and supplier payments, increasing accounts payable balances before payment cycles are completed.
IIA Standard 2110 and COBIT 5 stress financial controls, including monitoring accounts payable risks.
Final Justification:IIA References:
IPPF Standard 2110 – Governance
COBIT 5 – Accounts Payable Controls & Risks
ISO 20022 – Financial Messaging Standards (for EDI & EFT Transactions)
Which of the following is on advantage of a decentralized organizational structure, as opposed to a centralized structure?
Greater cost-effectiveness
Increased economies of scale
Larger talent pool
Strong internal controls
A decentralized organizational structure distributes decision-making authority across different business units or geographic regions. One major advantage is the ability to tap into a larger talent pool, as decision-making is not restricted to headquarters, and leadership opportunities exist at multiple levels.
(A) Greater cost-effectiveness.
Incorrect. A decentralized structure often increases costs due to duplicate resources, additional oversight, and inefficiencies from fragmented decision-making.
(B) Increased economies of scale.
Incorrect. Centralized organizations benefit more from economies of scale because they can standardize processes and consolidate purchasing power. Decentralization reduces these benefits by spreading decision-making across multiple locations.
(C) Larger talent pool. ✅
Correct. Decentralization allows organizations to recruit, develop, and retain talent in different locations, rather than relying solely on headquarters for leadership roles.
This aligns with IIA Standard 2110 – Governance, which emphasizes the importance of leadership distribution and talent management in organizations.
(D) Strong internal controls.
Incorrect. Centralized structures typically have stronger internal controls, as decision-making and risk management are closely monitored. Decentralization increases the risk of inconsistent controls across different units.
IIA Standard 2110 – Governance
COSO Framework – Organizational Structure and Risk Management
IIA GTAG – "Auditing Business Strategy Alignment"
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as decentralization expands the talent pool by enabling local decision-making and leadership development.
Which of the following purchasing scenarios would gain the greatest benefit from implementing electronic cate interchange?
A just-in-time purchasing environment
A Large volume of custom purchases
A variable volume sensitive to material cost
A currently inefficient purchasing process
Electronic Data Interchange (EDI) is a system that allows businesses to exchange documents (purchase orders, invoices, shipping notices) electronically, improving efficiency and accuracy.
Correct Answer (A - A Just-in-Time Purchasing Environment)
Just-in-time (JIT) purchasing requires real-time inventory management to reduce waste and costs.
EDI improves JIT by automating purchase orders, reducing lead times, and preventing stockouts.
The IIA GTAG 8: Audit of Inventory Management highlights that JIT purchasing benefits the most from automation through EDI.
Why Other Options Are Incorrect:
Option B (A large volume of custom purchases):
Custom purchases vary significantly in specifications, making standard EDI transactions less effective.
Option C (A variable volume sensitive to material cost):
While EDI helps with volume fluctuations, cost-sensitive purchasing requires additional financial analysis beyond EDI automation.
Option D (A currently inefficient purchasing process):
EDI improves efficiency, but implementing it in a failing process without first optimizing procedures could lead to automation of inefficiencies.
IIA GTAG 8: Audit of Inventory Management – Discusses automation benefits in JIT purchasing.
IIA Practice Guide: Auditing IT Controls – Covers EDI as a key tool for procurement efficiency.
Step-by-Step Explanation:IIA References for Validation:Thus, the greatest benefit from EDI is in a Just-in-Time (JIT) purchasing environment (A).
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
Nondisclosure agreements between the firm and its employees.
Logs of user activity within the information system.
Two-factor authentication for access into the information system.
limited access so information, based on employee duties
The most effective way to prevent the unauthorized disclosure of confidential information is to limit access based on employee roles and duties. This follows the principle of least privilege (PoLP), ensuring that employees only access the data necessary for their job functions.
(A) Nondisclosure agreements between the firm and its employees. ❌
Incorrect. While NDAs help deter leaks, they do not prevent unauthorized access to information. An employee who signs an NDA can still access and leak data.
(B) Logs of user activity within the information system. ❌
Incorrect. Activity logs help detect and investigate breaches but do not actively prevent unauthorized disclosure.
(C) Two-factor authentication for access into the information system. ❌
Incorrect. While two-factor authentication enhances system security, it does not prevent employees with authorized access from leaking confidential data.
(D) Limited access to information, based on employee duties. ✅
Correct. Role-based access control (RBAC) ensures that employees only access the information necessary for their job responsibilities, reducing the risk of leaks.
IIA GTAG "Identity and Access Management" highlights restricted access as the most effective control for preventing unauthorized disclosure of confidential data.
IIA GTAG – "Identity and Access Management"
IIA Standard 2120 – Risk Management (Data Protection Controls)
COBIT Framework – Information Security and Access Control
Analysis of Answer Choices:IIA References:Thus, the correct answer is D (Limited access to information, based on employee duties), as restricting access is the most effective preventive control against data disclosure.
What kind of strategy would be most effective for an organization to adopt in order to Implement a unique advertising campaign for selling identical product lines across all of its markets?
Export strategy.
Transnational strategy
Multi-domestic strategy
Globalization strategy
A globalization strategy focuses on delivering standardized products and marketing campaigns across multiple international markets with minimal local customization. This approach ensures brand consistency and cost efficiencies while targeting a broad audience.
(A) Export strategy.
Incorrect. An export strategy refers to selling domestic products overseas without significant marketing adaptation. It does not involve a unique advertising campaign tailored for global markets.
(B) Transnational strategy.
Incorrect. A transnational strategy balances global efficiency with local responsiveness, meaning advertising campaigns would be adapted based on regional preferences rather than being uniform across all markets.
(C) Multi-domestic strategy.
Incorrect. A multi-domestic strategy involves customizing products and marketing approaches for each local market. This is the opposite of a standardized advertising campaign.
(D) Globalization strategy. ✅
Correct. A globalization strategy implements a standardized marketing approach to maintain a consistent brand message across all markets while reducing costs.
Example: Companies like Apple, Coca-Cola, and Nike use globalized advertising to promote identical products across different countries.
IIA Standard 2110 – Governance emphasizes the need for alignment between business strategy and risk management, which includes global marketing decisions.
IIA Standard 2110 – Governance
COSO Framework – Strategic Risk Management
IIA GTAG – "Auditing Business Strategy Alignment"
Analysis of Answer Choices:IIA References:Thus, the correct answer is D, as a globalization strategy effectively supports a uniform advertising campaign for identical products across multiple markets.
An internal auditor observed that the organization's disaster recovery solution will make use of a cold site in a town several miles away. Which of the following is likely to be a characteristic of this disaster recover/ solution?
Data is synchronized in real time
Recovery time is expected to be less than one week
Servers are not available and need to be procured
Recovery resources end data restore processes have not been defined.
A cold site is a disaster recovery option that provides only basic infrastructure (such as power, space, and network connectivity) but does not have pre-installed IT equipment such as servers and storage. Organizations must procure and install servers and restore data before resuming operations, leading to longer recovery times.
Let’s analyze each option:
Option A: Data is synchronized in real-time
Incorrect.
Real-time data synchronization is a feature of hot sites, which have fully operational infrastructure and data replication.
Cold sites do not support real-time synchronization because they lack servers and storage.
Option B: Recovery time is expected to be less than one week
Incorrect.
Cold sites require significant setup time since servers and infrastructure must be procured, configured, and installed.
Recovery time can often exceed one week, depending on the complexity of IT systems.
Option C: Servers are not available and need to be procured
Correct.
A cold site lacks computing hardware (e.g., servers, storage, network devices), meaning the organization must purchase or transport servers to the site before recovery can begin.
IIA Reference: Internal auditors assess disaster recovery strategies, including the limitations of cold sites and their impact on business continuity. (IIA GTAG: Auditing Business Continuity and Disaster Recovery)
Option D: Recovery resources and data restore processes have not been defined.
Incorrect.
Even though a cold site lacks IT infrastructure, the organization still has a disaster recovery plan, which includes predefined recovery steps, resource planning, and data restoration procedures.
Thus, the verified answer is C. Servers are not available and need to be procured.
An organization has a declining inventory turnover but an Increasing gross margin rate, Which of the following statements can best explain this situation?
The organization's operating expenses are increasing.
The organization has adopted just-in-time inventory.
The organization is experiencing Inventory theft
The organization's inventory is overstated.
A declining inventory turnover means that inventory is sitting longer before being sold, while an increasing gross margin rate suggests the company is making higher profits on each sale. This combination is often a sign of inventory overstatement, possibly due to accounting errors or fraud.
Correct Answer (D - The Organization’s Inventory is Overstated)
Inventory turnover ratio = Cost of Goods Sold (COGS) / Average Inventory. A declining inventory turnover indicates higher inventory levels relative to sales.
Gross margin rate = (Revenue - COGS) / Revenue. An increasing gross margin means either higher selling prices or lower COGS.
Overstating inventory artificially reduces COGS, making gross margin appear higher.
The IIA’s GTAG 8: Audit of Inventory Management explains that inflated inventory levels can distort financial reporting and lead to misinterpretations of business performance.
Why Other Options Are Incorrect:
Option A (Operating expenses are increasing):
An increase in operating expenses would not directly explain declining inventory turnover or increasing gross margin.
Gross margin focuses on revenue and COGS, not operating expenses.
Option B (Just-in-Time Inventory):
A just-in-time (JIT) system reduces inventory levels, leading to higher inventory turnover, which contradicts the scenario.
Option C (Inventory Theft):
If theft were occurring, inventory levels would decrease, leading to higher turnover, not declining turnover.
GTAG 8: Audit of Inventory Management – Discusses inventory valuation risks, including overstatement and its impact on financial ratios.
IIA Practice Guide: Assessing Inventory Risks – Covers fraud risks related to inventory manipulation.
Step-by-Step Explanation:IIA References for Validation:Thus, the best explanation for a declining inventory turnover with an increasing gross margin rate is inventory overstatement (D).
Copyright © 2021-2025 CertsTopics. All Rights Reserved