Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > IIA > CIA > IIA-CIA-Part2

IIA-CIA-Part2 Practice of Internal Auditing Question and Answers

Question # 4

The internal auditors available to perform the engagement do not have sufficient skills related to the area under review. Which of the following iss an appropriate action for the chief audit executive to take?

A.

Continue the engagement with the available staff, providing more hands-on supervision than usual

B.

Limit the objectives and scope of the engagement to align them with the skills available among the current staff.

C.

Cosource the performance of the engagement using personnel in the area that will be reviewed to supplement the knowledge of the staff and complete the engagement

D.

Supplement the internal auditors assigned to the engagement by bringing onto the engagement team a consultant who is independent of the area under review and has the missing expertise

Full Access
Question # 5

To which of the following aspects should the chief audit executive give the most consideration while communicating an identified unacceptable risk to management?

A.

The organization's attitude to hierarchy

B.

The organization's whistleblowing strategy

C.

The organization's ongoing risk monitoring process

D.

The organization's risk management policy

Full Access
Question # 6

An audit observation states the following:

"Despite the rules of the organization there is no approved credit risk management policy in the subsidiary. The subsidiary is concluding contacts with clients who have very high credit ratings. The internal audit team tested 50 contacts and 17 showed clients with a poor credit history"

Which of the following components are missing in the observation?

A.

Cause and effect.

B.

Effect and criteria

C.

Condition and cause

D.

Criteria and condition.

Full Access
Question # 7

In order to obtain background information on an assigned audit of data center operations an internal auditor administers control questionnaires to select individuals who have primary responsibilities within the process. Which of the following is a drawback of this approach?

A.

It will be difficult to quantify the information obtained through this approach

B.

This approach does not help the auditor learn about the existence of controls

C.

It takes the auditor a long time to assess the relevant controls using this approach

D.

Information on control functionality is limited

Full Access
Question # 8

According to HA guidance, which of the following is the Key planning step internal auditors should perform to establish appropriate engagement objectives prior to starting an audit engagement?

A.

Review the organizational structure, management roles and responsibilities and operating procedures

B.

Evaluate management's risk assessment and the internal audit activity's risk assessment

C.

Assess process How and control documents used to meet regulatory requirements

D.

Review meeting notes from discussions involving management of the area to be reviewed.

Full Access
Question # 9

Which of the following should be included in a privacy audit engagement?

1. Assess the appropriateness of the information gathered.

2. Review the methods used to collect information.

3. Consider whether the information collected is in compliance with applicable laws.

4. Determine how the information is stored.

A.

1 and 3 only

B.

2 and 4 only

C.

1, 3, and 4 only

D.

1, 2, 3, and 4

Full Access
Question # 10

Management requested internal audit consulting services. During fieldwork significant control issues were identified by the internal audit team. Which of the following is an appropriate response from the chief audit executive?

A.

End the consulting engagement and report the results to management as planned

B.

Report the significant control issues to senior management and the board and recommend corrective action

C.

Mutually agree with the engagement client on corrective actions

D.

Focus on the consulting engagement and schedule an assurance engagement next to address the control issues

Full Access
Question # 11

A chief audit executive (CAE) a developing a work program for an upcoming engagement that will review an organization’s small contracting services. When of the following would the CAT need to consider most when developing the work program?

A.

The contracting department's staffing changes within the last year

B.

The certifications held by the internal auditors assigned to the engagement

C.

The internal audit activity's increase n budget and staffing for the year

D.

The organization's recent changes to how it processes payments

Full Access
Question # 12

An internal auditor is assessing the organization's risk management framework. Which of the following formulas should he use to calculate the residual risk?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Which of the following factors would the auditor in charge be least likely to consider when assigning tasks to audit team members for an engagement?

A.

The amount of experience the auditors have conducting audits in the specific area of the organization.

B.

The availability of the auditors in relation to the availability of key client staff.

C.

Whether the budgeted hours are sufficient to complete the audit within the current scope.

D.

Whether outside resources will be needed, and their availability.

Full Access
Question # 14

An internal auditor is asked to determine why the production line for a large manufacturing organization has been experiencing shutdowns due to unavailable pacts The auditor learns that production data used for generating automatic purchases via electronic interchange is collected on personal computers connected by a local area network (LAN) Purchases are made from authorized vendors based on both the production plans for the next month and an authorized materials requirements plan (MRP) that identifies the parts needed per unit of production The auditor suspects the shutdowns are occurring because purchasing requirements have not been updated for changes in production techniques Which of the following audit procedures should be used to test the auditor's theory?

A.

Compare purchase orders generated from test data input into the LAN with purchase orders generated from production data for the most recent period

B.

Develop a report of excess inventory and compare the inventory with current production volume

C.

Compare the pans needed based on current production estimates and the MRP for the revised production techniques with the purchase orders generated from the system for the same period

D.

Select a sample of production estimates and MRPs for several periods and trace them into the system to determine that input is accurate

Full Access
Question # 15

According to an internal audit observation, the organization’s rules of record management require all contracts to be registered and stored in a specific electronic system. One subsidiary has thousands of client contracts on paper, which are kept in the office because there are not enough assistants to scan the contracts into the system. Which of the following component should be added to this observation?

A.

Criteria

B.

Cause

C.

Effect

D.

Condition

Full Access
Question # 16

An internal auditor is preparing for an auditor of newly implemented software that is used by 3,000 employees in South America and Europe. What would be the best way for the auditor to gather relevant feedback?

A.

interview IT management in both regions

B.

Inspect regional user software training records

C.

Interview propel management and the vendor responsible for implementation

D.

Distribute surveys to software users in both regions

Full Access
Question # 17

An internal auditor conducted interviews with several employees, documented the interviews analyzed the summaries, and drew a number of conclusions. What sort of audit evidence has the internal auditor primarily obtained?

A.

Documentary evidence

B.

Testimonial evidence

C.

Analytical evidence

D.

Physical evidence

Full Access
Question # 18

The internal auditor and her supervisor are in dispute about a risk that was not tested during an audit of the procurement function. Which of the following tools would best support the auditor's decision not to test the risk?

A.

A spaghetti map

B.

A heat map.

C.

A process map

D.

An assurance map

Full Access
Question # 19

Which of the following computerized audit tools or techniques should be used if the internal auditor wants to extract specific files and records in the database?

A.

An expert or decision support system

B.

Generalized audit software

C.

A system utility program

D.

An integrated test facility

Full Access
Question # 20

According to IIA guidance, which of the following factors should the auditor in charge consider when determining the resource requirements for an audit engagement?

A.

The number, experience, and availability of audit staff as well as the nature, complexity, and time constraints of the engagement.

B.

The appropriateness and sufficiency of resources and the ability to coordinate with external auditors.

C.

The number, proficiency, experience, and availability of audit staff as well as the ability to coordinate with external auditors.

D.

The appropriateness and sufficiency of resources as well as the nature, complexity, and time constraints of the engagement.

Full Access
Question # 21

The final internal audit report should be distributed to which of the following individuals?

A.

Audit client management only

B.

Executive management only

C.

Audit client management, executive management, and others approved by the chief audit executive.

D.

Audit client management, executive management, and any those who request a copy.

Full Access
Question # 22

Which of the following statements about assurance maps is correct?

A.

An assurance map is used by the chief audit executive to coordinate assurance activities with other internal and external assurance providers

B.

An assurance map is a picture of all assurance engagements performed by the internal audit activity across the organization

C.

An assurance map is used by the engagement supervisor to coordinate the roles of various internal audit team members assigned to assurance engagements

D.

An assurance map lists the procedures and testing activities performed by an internal audit team during an assurance engagement

Full Access
Question # 23

An internal auditor determines that certain information from the engagement results is not appropriate for disclosure to all report recipients because it is privileged. In this situation, which of the following actions would be most appropriate?

A.

Disclose the information in a separate report.

B.

Distribute the information in a confidential report to the board only

C.

Distribute the reports through the use of blind copies.

D.

Exclude the results from the report and verbally report the conditions to senior management and the board.

Full Access
Question # 24

A healthcare organization's chief audit executive (CAE) noted that the organization's IT team relies heavily on a vendor. Therefore an IT vendor assessment review was added to the annual audit plan. During the review, the audit team discovered that the vendor had not been performing proper monitoring to ensure that the subcontractors it hired comply with the organization requirements. The organization's chief information officer (ClO) does not agree with the audit team's recommendation for the IT team to monitor the compliance level of vendor subcontractors. How should the audit team proceed to resolve this situation?

A.

Write a risk acceptance memo for the CIO to sign acknowledging the observation and indicating a willingness to accept the risk.

B.

Provide an example of the attestation form that vendors must use. Then, recommend that the IT team require vendors to submit the attestation form on a regular basis.

C.

Escalate the issue to the audit committee, as the CIO is unwilling to implement the recommended action plan.

D.

Escalate the issue to the CAE to assess whether the ClO's reasoning is acceptable.

Full Access
Question # 25

Which of the following is not a primary reason for outsourcing a portion of the internal audit activity?

A.

To gain access to a wider variety of skills, competencies and best practices.

B.

To complement existing expertise with a required skill and competency for a particular audit engagement.

C.

To focus on and strengthen core audit competencies.

D.

To provide the organization with appropriate contingency planning for the internal audit function.

Full Access
Question # 26

According to IIA guidance, which of the following procedures would be least effective in managing the risk of payroll fraud?

A.

The employee’s name listed on organization’s payroll is compared to the personnel records.

B.

Payroll time sheets are reviewed and approved by the timekeeper before processing.

C.

Employee access to the payroll database is deactivated immediately upon termination.

D.

Changes to payroll are validated by the personnel department before being processed.

Full Access
Question # 27

An organization buys crude oil on the open market and refines it into a high-quality gasoline. The price of crude oil is extremely volatile. Which of the following is the most appropriate risk management technique to protect the organization against these price fluctuations?

A.

Enter into long-term gasoline purchase agreements with end customers.

B.

Trade crude oil derivatives at financial markets in order to benefit from price fluctuations

C.

Purchase crude oil-related derivatives such as futures or options

D.

Stock as much raw materials as possible and consider Investing into additional facilities

Full Access
Question # 28

An internal auditor is asked to review a recently completed renovation to a retail outlet. Which of the following would provide the most reliable evidence that the completed work conformed to the plan?

A.

An interview with the employee who performed the work

B.

An analysis of purchasing and receiving documentation

C.

Existence of a signed completion document accepting the work

D.

A physical inspection of the retail outlet.

Full Access
Question # 29

According to IIA guidance, which of the following strategies would add the least value to the achievement of the internal audit activity's (IAA's) objectives?

A.

Align organizational activities to internal audit activities and measure according to the approved IAA performance measures.

B.

Establish a periodic review of monitoring and reporting processes to help ensure relevant IAA reporting.

C.

Use the results of IAA engagement and advisory reporting to guide current and future internal audit activities.

D.

Establish a format and frequency for IAA reporting that is appropriate and aligns with the organization's governance structure.

Full Access
Question # 30

Upon concluding the engagement fieldwork an internal auditor discusses the audit findings with operational management There is a greater likelihood that the auditor will obtain a responsive action plan from management when both parties agree on which of the following attributes of the audit finding?

A.

Criteria

B.

Condition

C.

Cause

D.

Effect

Full Access
Question # 31

According to IIA guidance, which of the following reflects a characteristic of sufficient and reliable information?

A.

The establishment of an audit approach and documentation system

B.

The standardization of workpaper terminology and notations

C.

The ability to reach consistent audit conclusions regardless of who performs the audit

D.

The application of documentation standards m an appropriate and consistent manner

Full Access
Question # 32

Which of the following is a detective control for managing the risk of fraud?

A.

Awareness of prior incidents of fraud.

B.

Contractor non-disclosure agreements.

C.

Verification of currency exchange rates.

D.

Receipts for employee expenses.

Full Access
Question # 33

A chief audit executive's report to the board showed a significant trend of recent aud4s going over planned budgeted hours. Which of the following factors could cause this trend?

A.

Poor engagement supervision

B.

ineffective board reporting

C.

Untimely observation follows up and closure

D.

Limited staff resources

Full Access
Question # 34

A toy manufacturer receives certain components from an overseas supplier and uses them to assemble final products Recently quality reviews have identified numerous issues regarding the components' compliance with mandatory quality standards. Which type of engagement would be most appropriate to assess the root causes of the quality issues?

A.

A risk assessment

B.

An operational audit

C.

A third-party audit

D.

A fraud investigation

Full Access
Question # 35

During a review of data privacy an internal auditor is tasked with testing management's identification and prioritization of critical data collected by the organization. Which of the following steps would accomplish this objective?

A.

interview management to determine what types of data are collected and maintained

B.

Trace data from storage to the collection sources to determine how critical data is collected and organized

C.

Review a sample of data to determine whether the risk classification is reasonable

D.

Document and test a data inventory and classification program by determining the data classification levels and framework

Full Access
Question # 36

For which of the following fraud engagement activities would it be most appropriate to involve a forensic auditor?

A.

Independently evaluating conflicts of interests.

B.

Assessing contracts for relevant terms and conditions.

C.

Performing statistical analysis for data anomalies.

D.

Preparing evidentiary documentation.

Full Access
Question # 37

After finalizing an assurance engagement concerning safety operations in the oil mining process, the audit team concluded that no key controls were compromised. However, some opportunities for improvement were noted. Which of the following would be the most appropriate way for the chief audit executive (CAE) to report these results?

A.

The CAE should send the final report to operational and senior management and the audit committee.

B.

The CAE should send the final report to operational management only, as there is no need to communicate this information to higher levels.

C.

The CAE should notify operational and senior management that the audit engagement was completed with no significant findings to report.

D.

The CAE should send the final report to operational management and notify senior management and the audit committee that no significant findings were identified.

Full Access
Question # 38

The chief audit executive (CAE) of a small internal audit activity (IAA) plans to test conformance with the Standards through a quality assurance review. According to the Standards, which of the following are acceptable practice for this review?

1. Use an external service provider.

2. Conduct a self-assessment with independent validation.

3. Arrange for a review by qualified employees outside of the IAA.

4. Arrange for reciprocal peer review with another CAE.

A.

1 and 2

B.

2 and 4

C.

1, 2, and 3

D.

2, 3, and 4

Full Access
Question # 39

An internal auditor is conducting a financial audit. Which of the following audit procedures is most appropriate when existing internal controls are weak?

A.

Analytical procedures.

B.

Detail testing.

C.

Test of design.

D.

Test of control.

Full Access
Question # 40

A senior internal auditor is hired within the internal audit activity for a period of two years before advancing to an operations manager role within the business operations team. When staffing arrangement is being used in this scenario?

A.

Comer of competence

B.

Career model

C.

Rotational model

D.

Cosourcing agreement

Full Access
Question # 41

An IT auditor is reviewing the access controls in an organization's accounting application. The auditor intends to deploy a tool that can help test the logical controls embedded in the system to ensure employee access is granted according to need. Which of the following would help achieve this objective?

A.

Utility software

B.

Generalized audit software

C.

Audit expert systems.

D.

integrated test facility

Full Access
Question # 42

An organization recently acquired a subsidiary in a new industry, and management asked the chief audit executive (CAE) to perform a comprehensive audit of the subsidiary prior to recommencing operations The CAE is unsure her team has the necessary skills and knowledge to accept the engagement According to IIAguidance, which of the following responses by the CAE would be most appropriate?

A.

The CAE should accept the engagement and ensure that an explanation of the expertise limitations is included in the final audit report.

B.

The CAE should ask management to hire an external expert who is familiar with the industry to perform an independent audit for management

C.

The CAE should accept the engagement and hire an external expert to assist the audit team with the audit of the subsidiary

D.

The CAE should recommend postponing the engagement until the internal audit team is able to develop sufficient knowledge of the new industry

Full Access
Question # 43

Which of the following risk assessment approaches involves gathering data from work team representing different levels of an organisation?

A.

Surveys

B.

Management produced analysis 0

C.

Facilitated team workshops

D.

Weighted risk factors

Full Access
Question # 44

The chief audit executive (CAF) determined that the residual risk identified in an assurance engagement is acceptable. When should this be communicated to senior management?

A.

When the CAE reports the audit outcome to senior management.

B.

When the residual risk is identified before the engagement is complete.

C.

Immediately, as residual risk should be communicated as soon as possible

D.

When management of the area under review has resolved and mitigated the residual risk

Full Access
Question # 45

An internal audit team leader is having difficulties completing the planning phase of an assurance engagement because the business unit lacks a system of internal controls. Which of the following is the most appropriate course of action for the internal audit team leader?

A.

Defer the engagement until a system of internal control has been established

B.

Change the scheduled engagement from assurance to consulting to help correct the shortcomings

C.

Add a consulting component to the already scheduled assurance engagement

D.

Seek the involvement of the external auditor to assist with improving the internal controls

Full Access
Question # 46

Which of the following is one of the differences between probability-proportional-to-size (PPS) and attribute sampling?

A.

PPS sampling s used to reach conclusions regarding monetary amounts, attribute sampling is not.

B.

PPS sampling is used to roach conclusions regarding rates of occurrence, attribute sampling is not.

C.

PPS sampling a applied within the context of testing controls attribute sampling s not.

D.

Attribute sampling is affected by the monetary book value of the population PPS sampling is not

Full Access
Question # 47

The human resources (HR) department was last reviewed three years ago and is due for an assurance engagement after undergoing recent process changes. Which of the following would the most effective option identify the HR department's risks and controls?

A.

Meet with the chief operating officer 10 obtain Information about the MR department

B.

Review the previous internal audit report and locus on key audit observations and action plans

C.

Review the organization's risk strategy and risk appetite framework

D.

Discuss the department's present strategies ‘and objectives with the head of the HR department

Full Access
Question # 48

An internal auditor wants to identity potential ghost employees in the organization's payroll system The auditor extracts the following data

- Human resources data with employees' names addresses employment conditions and identification codes

- Payroll data

- Logs from entrance systems

With this data, which of the following types of ghost employees will the auditor be able to identify?

A.

Employees who are being paid more than then approved wages

B.

Employees who get paid although their employment has expired

C.

Employees who are related to one of the subcontractors

D.

Employees who are physically present at the workplace but who do not perform the specified job duties

Full Access
Question # 49

Which of the following best illustrates the primary focus of a risk-based approach to control self-assessment?

A.

To evaluate controls regarding the computer security of an oil refinery.

B.

To examine the processes involved in exploring, developing, and operating a gold mine.

C.

To assess the likelihood and impact of events associated with operating a finished goods warehouse.

D.

To link a financial institution's business objectives to a work unit responsible for the associated risk.

Full Access
Question # 50

In the following risk control map risks have been categorized based on the level of significance and the associated level of control. Which of the following statements is true regarding Risk C?

A.

The level of control is appropriate given the level of risk

B.

The level of control is excessive given the level of risk

C.

The level of control is inadequate given the level of risk

D.

There is not enough of information to determine whether the controls are appropriate or not

Full Access
Question # 51

According to IIA guidance, which of the following is the most appropriate action to be taken by the chief executive (CAE) if management refuses to accept audit recommendations and implement corrective actions, Even after escalation to senior management?

A.

The CAE should continue to meet with management to obtain their agreement for corrective action

B.

The CAE should note in the final report that management has decided to accept the risk.

C.

The CAE should ask that additional testing be undertaken to strengthen his case as to the need for corrective action.

D.

The CAE should advise senior management of his intention to escalate the matter to the board.

Full Access
Question # 52

Which of the following statements regarding the risk management process' support of the internal audit activity is true?

A.

The risk management process can provide more extensive internal audit services to the organization if it does not have an internal audit department

B.

The risk management process supports internal audit by evaluating whether critical controls are adequate and effective.

C.

The risk management process can determine whether all significant risks have been identified and are being treated.

D.

The risk management process establishes an organization-specific documented risk management framework.

Full Access
Question # 53

A corporate merger decision prompts the cruel audit executive (CAE) to propose interim changes lo the existing annual audit plan to account for emerging risks. When of the following is the most appropriate action for the CAE to take regarding the changes made to the audit plan?

A.

Present the revised audit plan directly to the board for approval

B.

Communicate with the chief financial officer and present the revised audit plan to the CEO for approval

C.

Present the revised audit plan directly to the CEO for approval

D.

Communicate with the CCO and present the revised audit plan to the board for approval

Full Access
Question # 54

Which of the following statements about including consulting engagements in the annual internal audit plan is true?

A.

All requests for consulting engagements must be included in the annual internal audit plan

B.

Assurance engagements must be included in the annual internal audit plan but there is no requirement to include consulting engagements

C.

Consulting engagements do not need to be included m the annual internal audit plan unless requested by the board

D.

The acceptance of proposed consulting engagements into the annual internal audit plan may depend on their ability to add value

Full Access