Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > IIA > CIA > IIA-CIA-Part3

IIA-CIA-Part3 Internal Audit Function Question and Answers

Question # 4

Which of the following situations best illustrates a "false positive" in the performance of a spam filter?

A.

The spam filter removed Incoming communication that included certain keywords and domains.

B.

The spam filter deleted commercial ads automatically, as they were recognized as unwanted.

C.

The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.

D.

The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.

Full Access
Question # 5

Which of the following is a characteristic of big data?

A.

Big data is often structured.

B.

Big data analytic results often need to be visualized.

C.

Big data is often generated slowly and is highly variable.

D.

Big data comes from internal sources kept in data warehouses.

Full Access
Question # 6

Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?

A.

The cash dividends received increase the investee investment account accordingly.

B.

The investee must adjust the investment account by the ownership interest

C.

The investment account is adjusted downward by the percentage of ownership.

D.

The investee must record the cash dividends as dividend revenue

Full Access
Question # 7

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?

A.

Monitoring network traffic.

B.

Using whitelists and blacklists to manage network traffic.

C.

Restricting access and blocking unauthorized access to the network

D.

Educating employees throughout the company to recognize phishing attacks.

Full Access
Question # 8

An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;

- Risks specific to the organization itself.

- Risks specific to the service provider.

- Risks shared by both the organization and the service provider

Which of the following risks should the auditor classify as specific to the service provider?

A.

Unexpected increases in outsourcing costs.

B.

Loss of data privacy.

C.

Inadequate staffing.

D.

Violation of contractual terms.

Full Access
Question # 9

Which of the following is an example of a physical control?

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization's critical data

Full Access
Question # 10

Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?

A.

Cash payback technique

B.

Annual rate of return technique.

C.

Internal rate of return method.

D.

Net present value method.

Full Access
Question # 11

An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?

A.

The capital accounts of the partners should be increased by she original cost of the contributed equipment.

B.

The capital accounts should be increased using a weighted average based by the current percentage of ownership.

C.

No action is needed, as the capital account of each partner was increased by the correct amount,

D.

The capital accounts of the partners should be increased by She fair market value of their contribution.

Full Access
Question # 12

If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?

A.

Settlement of short-term obligations may become difficult.

B.

Cash may be bed up in items not generating financial value.

C.

Collection policies of the organization are ineffective.

D.

The organization is efficient in using assets to generate revenue.

Full Access
Question # 13

Which of the following is true of matrix organizations?

A.

A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.

B.

A combination of product and functional departments allows management to utilize personnel from various Junctions.

C.

Authority, responsibility and accountability of the units Involved may vary based on the project's life, or the organization's culture

D.

It is best suited for firms with scattered locations or for multi-line, Large-scale firms.

Full Access
Question # 14

An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?

A.

Lower costs.

B.

Slower decision making at the senior executive level.

C.

Limited creative freedom in lower-level managers.

D.

Senior-level executives more focused on short-term, routine decision making

Full Access
Question # 15

Which of the following best describes the primary objective of cybersecurity?

A.

To protect the effective performance of IT general and application controls.

B.

To regulate users' behavior it the web and cloud environment.

C.

To prevent unauthorized access to information assets.

D.

To secure application of protocols and authorization routines.

Full Access
Question # 16

With regard to project management, which of the following statements about project crashing Is true?

A.

It leads to an increase in risk and often results in rework.

B.

It is an optimization technique where activities are performed in parallel rather than sequentially.

C.

It involves a revaluation of project requirements and/or scope.

D.

It is a compression technique in which resources are added so the project.

Full Access
Question # 17

An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?

A.

Regular review of logs.

B.

Two-level authentication.

C.

Photos on smart cards.

D.

Restriction of access hours.

Full Access
Question # 18

As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?

A.

The auditor eliminated duplicate information.

B.

The auditor organized data to minimize useless information.

C.

The auditor made data usable for a specific purpose by ensuring that anomalies were Identified and corrected.

D.

The auditor ensured data fields were consistent and that data could be used for a specific purpose.

Full Access
Question # 19

Which of the following application controls, implemented by management, monitors data being processed to ensure the data remains consistent and accurate?

A.

Management trail controls

B.

Output controls.

C.

Integrity controls

D.

input controls

Full Access
Question # 20

A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?

A.

Cost of sales and net income are understated

B.

Cost of sales and net income are overstated

C.

Cost of sales is understated and net income is overstated

D.

Cost of sales is overstated and net income is understated

Full Access
Question # 21

Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?

A.

Remote wipe.

B.

Software encryption.

C.

Device encryption.

D.

Authentication.

Full Access
Question # 22

An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?

A.

To verify that the application meets stated user requirements.

B.

To verify that standalone programs match code specifications.

C.

To verify that the application would work appropriately for the intended number of users.

D.

To verify that all software and hardware components work together as intended.

Full Access
Question # 23

A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?

A.

Lack of coordination among different business units

B.

Operational decisions are inconsistent with organizational goals

C.

Suboptimal decision making

D.

Duplication of business activities

Full Access
Question # 24

Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?

A.

Rooting.

B.

Eavesdropping.

C.

Man in the middle.

D.

Session hijacking.

Full Access
Question # 25

Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?

A.

Periodic assessments

B.

Ongoing monitoring

C.

Full external assessments

D.

Self-Assessment with Independent Validation (SAIV)

Full Access
Question # 26

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?

A.

Not installing anti-malware software.

B.

Updating operating software in a haphazard manner.

C.

Applying a weak password for access to a mobile device.

D.

Jailbreaking a locked smart device.

Full Access
Question # 27

Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?

A.

Risk tolerance.

B.

Performance.

C.

Threats and opportunities.

D.

Governance.

Full Access
Question # 28

Which of the following security controls would be appropriate to protect the exchange of information?

A.

Firewalls.

B.

Activity logs.

C.

Antivirus software.

D.

File encryption.

Full Access
Question # 29

How do data analysis technologies affect internal audit testing?

A.

They improve the effectiveness of spot check testing techniques.

B.

They allow greater insight into high risk areas.

C.

They reduce the overall scope of the audit engagement,

D.

They increase the internal auditor's objectivity.

Full Access
Question # 30

Which of the following physical security controls is able to serve as both a detective and preventive control?

A.

Authentication logs.

B.

Card key readers.

C.

Biometric devices

D.

Video surveillance.

Full Access
Question # 31

Which of the following principles s shared by both hierarchies and open organizational structures?

1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.

2. A supervisor's span of control should not exceed seven subordinates.

3. Responsibility should be accompanied by adequate authority.

4. Employees at all levels should be empowered to make decisions.

A.

1 and 3 only

B.

1 and 4 only

C.

2 and 3 only

D.

3 and 4 only

Full Access
Question # 32

Which of the following key performance indicators would serve as the best measurement of internal audit innovation?

A.

The number of scheduled and completed audits and percentage of substantial recommendations

B.

The board’s satisfaction index and internal audit staff commitment ratings

C.

Internal audit staff’s application of technology in audit fieldwork and participation in professional organizations and publications

D.

Internal audit staff’s compliance with the audit manual and technical knowledge in auditing, information security, and cloud computing issues

Full Access
Question # 33

Which of the following storage options would give the organization the best chance of recovering data?

A.

Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.

B.

Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.

C.

Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.

D.

Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.

Full Access
Question # 34

Which of the following techniques would best detect an inventory fraud scheme?

A.

Analyze Invoice payments just under individual authorization limits.

B.

Analyze stratification of inventory adjustments by warehouse location.

C.

Analyze inventory invoice amounts and compare with approved contract amounts.

D.

Analyze differences discovered during duplicate payment testing

Full Access
Question # 35

A company records income from an investment in common stock when it does which of the following?

A.

Purchases bonds.

B.

Receives interest.

C.

Receives dividends

D.

Sells bonds.

Full Access
Question # 36

Which of the following best describes meaningful recommendations for corrective actions?

A.

Recommendations that address the gap between the condition and consequence and provide at least short-term fixes

B.

Recommendations that address the gap between the criteria and condition and provide at least short-term fixes

C.

Recommendations that address the gap between the criteria and consequence and provide long-term solutions

D.

Recommendations that address the gap between the criteria and condition and provide long-term solutions

Full Access
Question # 37

Which of the following is an established systems development methodology?

A.

Waterfall.

B.

Projects in Controlled Environments (PRINCE2).

C.

Information Technology Infrastructure Library (ITIL).

D.

COBIT

Full Access
Question # 38

An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?

A.

Customers can access and update personal information when needed.

B.

The organization retains customers' personal information indefinitely.

C.

Customers reserve the right to reject sharing personal information with third parties.

D.

The organization performs regular maintenance on customers' personal information.

Full Access
Question # 39

According to IIA guidance on IT, which of the following best describes a logical access control?

A.

Require complex passwords to be established and changed quarterly

B.

Require swipe cards to control entry into secure data centers.

C.

Monitor access to the data center with closed circuit camera surveillance.

D.

Maintain current role definitions to ensure appropriate segregation of duties

Full Access
Question # 40

Which of the following facilitates data extraction from an application?

A.

Application program code.

B.

Database system.

C.

Operating system.

D.

Networks.

Full Access
Question # 41

Which of the following are the most common characteristics of big data?

A.

Visibility, validity, vulnerability

B.

Velocity, variety, volume

C.

Complexity, completeness, constancy

D.

Continuity, control, convenience

Full Access
Question # 42

An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?

A.

Required documentation of process for discontinuing use of the devices

B.

Required removal of personal pictures and contacts.

C.

Required documentation of expiration of contract with service provider.

D.

Required sign-off on conflict of interest statement.

Full Access
Question # 43

According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?

A.

Project portfolio.

B.

Project development

C.

Project governance.

D.

Project management methodologies

Full Access
Question # 44

Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?

A.

Not installing anti-malware software

B.

Updating operating software in a haphazard manner,

C.

Applying a weak password for access to a mobile device.

D.

JoIIbreaking a locked smart device

Full Access
Question # 45

According to IIA guidance, which of the following is an IT project success factor?

A.

Streamlined decision-making, rather than building consensus among users.

B.

Consideration of the facts, rather than consideration of the emotions displayed by project stakeholders.

C.

Focus on flexibility and adaptability, rather than use of a formal methodology.

D.

Inclusion of critical features, rather than inclusion of an array of supplementary features.

Full Access
Question # 46

When determining the level of physical controls required for a workstation, which of the following factors should be considered?

A.

Ease of use.

B.

Value to the business.

C.

Intrusion prevention.

D.

Ergonomic model.

Full Access
Question # 47

Which of the following best explains why an organization would enter into a capital lease contract?

A.

To increase the ability to borrow additional funds from creditors

B.

To reduce the organization’s free cash flow from operations

C.

To improve the organization’s free cash flow from operations

D.

To acquire the asset at the end of the lease period at a price lower than the fair market value

Full Access
Question # 48

Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?

A.

Whether customers are asked to renew their consent for their data processing at least quarterly.

B.

Whether private data is processed in accordance with the purpose for which the consent was obtained?

C.

Whether the organization has established explicit and entitywide policies on data transfer to third parties.

D.

Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.

Full Access
Question # 49

According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?

A.

Salary and status.

B.

Responsibility and advancement.

C.

Work conditions and security.

D.

Peer relationships and personal life.

Full Access
Question # 50

The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?

A.

Beginning inventory was overstated for the year.

B.

Cost of goods sold was understated for the year.

C.

Ending inventory was understated for the year.

D.

Cost of goods sold was overstated for the year.

Full Access
Question # 51

An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?

A.

Cold recovery plan,

B.

Outsourced recovery plan.

C.

Storage area network recovery plan.

D.

Hot recovery plan

Full Access
Question # 52

When should the results of internal quality assessments be communicated to senior management and the board?

A.

At least once every five years

B.

At least annually

C.

Periodically, at the discretion of the chief audit executive

D.

Only after the results have been validated by an external assessment

Full Access
Question # 53

Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?

A.

Predictive analytics.

B.

Prescriptive analytics.

C.

Descriptive analytics.

D.

Diagnostic analytics.

Full Access
Question # 54

The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

1. Favorable labor efficiency variance.

2. Adverse labor rate variance.

3. Adverse labor efficiency variance.

4. Favorable labor rate variance.

A.

1 and 2

B.

1 and 4

C.

3 and A

D.

2 and 3

Full Access
Question # 55

Which of the following contract concepts is typically given in exchange for the execution of a promise?

A.

Lawfulness.

B.

Consideration.

C.

Agreement.

D.

Discharge

Full Access
Question # 56

An organization produces products X and Y. The materials used for the production of both products are limited to 500 Kilograms

(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows in order to maximize profit, how much of product Y should the organization produce each month?

$10 $13

2 kg

70 units

6 kg

120 units

A.

50 units

B.

60 units

C.

70 units

D.

1:20 units

Full Access
Question # 57

Which of the following statements is accurate when planning for an external quality assurance assessment of the internal audit function?

A.

The external assessment would include the audit function’s compliance with laws and regulations

B.

The selected qualified assessor can be from the organization’s shared services team

C.

The external assessment team members must work for an accounting firm

D.

The frequency of the performance of assessments should be considered by the assessor

Full Access
Question # 58

Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?

A.

Key performance indicators.

B.

Reports of software customization.

C.

Change and patch management.

D.

Master data management

Full Access
Question # 59

Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?

A.

Warm site recovery plan.

B.

Hot site recovery plan.

C.

Cool site recovery plan.

D.

Cold site recovery plan.

Full Access
Question # 60

For employees, the primary value of implementing job enrichment is which of the following?

A.

Validation of the achievement of their goals and objectives

B.

Increased knowledge through the performance of additional tasks

C.

Support for personal growth and a meaningful work experience

D.

An increased opportunity to manage better the work done by their subordinates

Full Access
Question # 61

Which of the following can be classified as debt investments?

A.

Investments in the capital stock of a corporation

B.

Acquisition of government bonds.

C.

Contents of an investment portfolio,

D.

Acquisition of common stock of a corporation

Full Access
Question # 62

Which of the following responsibilities would ordinary fall under the help desk function of an organization?

A.

Maintenance service items such as production support.

B.

Management of infrastructure services, including network management.

C.

Physical hosting of mainframes and distributed servers

D.

End-to -end security architecture design.

Full Access
Question # 63

The internal audit function conducted an engagement on maintenance operations of a construction organization and identified several issues of medium importance. The head of maintenance proposed an improvement plan with deadlines and personnel responsible. The internal audit function issued the final report to senior management. Senior management was dissatisfied with the report as they believed that improvement plan deadlines should be considerably shorter. Which of the following should the internal audit function change in the reporting process?

A.

Discontinue discussing draft reports with responsible employees, as their input is needed during fieldwork only

B.

Involve senior management at the draft report stage and in the development of action plans

C.

Request senior management to issue a separate memo regarding their changes to deadlines

D.

Invite senior management to the board meeting regarding engagement results so that they can express their concerns

Full Access
Question # 64

Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?

A.

Decentralized

B.

Centralized

C.

Departmentalized

D.

Tall structure

Full Access
Question # 65

Which of the following statements is true regarding cost-volume-profit analysis?

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.

B.

Breakeven point is the amount of units sold to cover variable costs.

C.

Breakeven occurs when the contribution margin covers fixed costs.

D.

Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.

Full Access
Question # 66

Which of the following is an example of a physical control?

A.

Providing fire detection and suppression equipment

B.

Establishing a physical security policy and promoting it throughout the organization

C.

Performing business continuity and disaster recovery planning

D.

Keeping an offsite backup of the organization’s critical data

Full Access
Question # 67

Which of the following describes the primary advantage of using data analytics in internal auditing?

A.

It helps support the internal audit conclusions with factual evidence.

B.

It reduces the time and effort needed to prepare the audit report.

C.

It helps prevent internal auditors from unknowingly disregarding key process risks.

D.

It enables internal auditors to meet their responsibility for monitoring controls.

Full Access
Question # 68

An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?

A.

Cybercriminals hacking into the organization's time and expense system to collect employee personal data.

B.

Hackers breaching the organization's network to access research and development reports

C.

A denial-of-service attack that prevents access to the organization's website.

D.

A hacker accessing she financial information of the company

Full Access
Question # 69

Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?

A.

Last-in-first-Out (LIFO}.

B.

Average cost.

C.

First-in-first-out (FIFO).

D.

Specific identification

Full Access
Question # 70

Which of the following best describes the use of predictive analytics?

A.

A supplier of electrical parts analyzed an instances where different types of spare parts were out of stock prior to scheduled deliveries of those parts.

B.

A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.

C.

A supplier of electrical parts analyzed all instances of a part being, out of stock poor to its scheduled delivery date and discovered that increases in sales of that part consistently correlated with stormy weather.

D.

A supplier of electrical parts analyzed sales and stock information and modelled different scenarios for making decisions on stock reordering and delivery

Full Access
Question # 71

According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?

A.

Initiation.

B.

Planning.

C.

Execution.

D.

Monitoring.

Full Access
Question # 72

Which of the following best describes a potential benefit of using data analyses?

A.

It easily aligns with existing internal audit competencies to reduce expenses

B.

It provides a more holistic view of the audited area.

C.

Its outcomes can be easily interpreted into audit: conclusions.

D.

Its application increases internal auditors' adherence to the Standards

Full Access
Question # 73

On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?

A.

It should be reported as an administrative expense on the income statement.

B.

It should be reported as period cost other than a product cost on the management accounts

C.

It should be reported as cost of goods sold on the income statement.

D.

It should be reported on the balance sheet as part of inventory.

Full Access
Question # 74

A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?

A.

Fixed and variable manufacturing costs are less than the special offer selling price

B.

The manufacturer can fulfill the order without expanding the capacities of the production facilities

C.

Costs related to accepting this offer can be absorbed through the sale of other products

D.

The manufacturer’s production facilities are currently operating at full capacity

Full Access
Question # 75

Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?

A.

Firewall.

B.

Encryption.

C.

Antivirus.

D.

Biometrics.

Full Access
Question # 76

An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal

Auditor be most concerned about?

A.

Compliance.

B.

Privacy

C.

Strategic

D.

Physical security

Full Access
Question # 77

The engagement supervisor prepares the final engagement communication for dissemination. Since the chief audit executive (CAE) is on leave, the supervisor is delegated to disseminate the final engagement communication to all relevant parties. Who should be accountable for the final engagement communication?

A.

Engagement supervisor

B.

Chief audit executive

C.

The board

D.

The internal audit team

Full Access
Question # 78

Which of the following measures the operating success of a company for a given period of time?

A.

Liquidity ratios.

B.

Profitability ratios.

C.

Solvency ratios.

D.

Current ratios.

Full Access
Question # 79

Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?

A.

Voice recognition and token

B.

Password and fingerprint

C.

Fingerprint and voice recognition

D.

Password and token

Full Access
Question # 80

Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?

A.

The organization sells inventory to an overseas subsidiary at fair value.

B.

The local subsidiary purchases inventory at a discounted price.

C.

The organization sells inventory to an overseas subsidiary at the original cost.

D.

The local subsidiary purchases inventory at the depreciated cost.A

Full Access
Question # 81

The sole internal auditor of a municipality wants to implement proper supervision over internal audit workpapers. Which of the following would be the most appropriate?

A.

According to the Global Internal Audit Standards, in this situation the internal auditor can perform a self-review of selected workpapers

B.

Request each engagement client to conduct a review of a sample of workpapers at the end of the engagement

C.

Ask the board or management to sign off on workpapers

D.

Engage peer reviewers from other organizations with legal precautions in place

Full Access
Question # 82

How should internal auditors respond when the manager of an area under review disagrees with a finding?

A.

Escalate the disagreements to the CEO

B.

Ignore the manager’s concerns and proceed with finalizing the audit report

C.

Escalate the disagreements to the chief audit executive

D.

Reperform the audit process where there are disagreements

Full Access
Question # 83

A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?

A.

Readiness assessment.

B.

Project risk assessment.

C.

Post-implementation review.

D.

Key phase review.

Full Access
Question # 84

Which of the following statements is true regarding the management-by-objectives method?

A.

Management by objectives is most helpful in organizations that have rapid changes.

B.

Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.

C.

Management by objectives helps organizations to keep employees motivated.

D.

Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.

Full Access
Question # 85

An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?

A.

Cost of sales increased relative to sales.

B.

Total sales increased relative to expenses.

C.

The organization had a higher dividend payout rate in year two.

D.

The government increased the corporate tax rate

Full Access
Question # 86

Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?

A.

Analysis of the full population of existing data.

B.

Verification of the completeness and integrity of existing data.

C.

Continuous monitoring on a repetitive basis.

D.

Analysis of the databases of partners, such as suppliers.

Full Access
Question # 87

How can the concept of relevant cost help management with behavioral analyses?

A.

It explains the assumption mat both costs and revenues are linear through the relevant range

B.

It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.

C.

It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions

D.

It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action

Full Access
Question # 88

Which of the following would be most likely found in an internal audit procedures manual?

A.

A summary of the strategic plan of the area under review

B.

Appropriate response options for when findings are disputed by management

C.

An explanation of the resources needed for each engagement

D.

The extent of the auditor's authority to collect data from management

Full Access
Question # 89

Which of the following is most appropriate for the chief audit executive to keep in mind when establishing policies and procedures to guide the internal audit function?

A.

The nature of the internal audit function

B.

The size of the organization

C.

The size and maturity of the internal audit function

D.

The structure of the organization

Full Access
Question # 90

Which of the following is a systems software control?

A.

Restricting server room access to specific individuals

B.

Housing servers with sensitive software away from environmental hazards

C.

Ensuring that all user requirements are documented

D.

Performing of intrusion testing on a regular basis

Full Access
Question # 91

According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?

A.

The business continuity management charter

B.

The business continuity risk assessment plan

C.

The business impact analysis plan

D.

The business case for business continuity planning

Full Access
Question # 92

An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?

A.

A star

B.

A cash cow

C.

A question mark

D.

A dog

Full Access
Question # 93

The management of working capital is most crucial for which of the following aspects of business?

A.

Liquidity

B.

Profitability

C.

Solvency

D.

Efficiency

Full Access
Question # 94

Which of the following biometric access controls uses the most unique human recognition characteristic?

A.

Facial comparison using photo identification.

B.

Signature comparison.

C.

Voice comparison.

D.

Retinal print comparison.

Full Access
Question # 95

An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?

A.

Horizontal analysis

B.

Vertical analysis

C.

Ratio analysis

D.

Trend analysis

Full Access
Question # 96

An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?

A.

Conduct an inventory of access rights of all employees who have changed their position within the last year

B.

Remove unneeded access rights for uncovered instances and reprimand system administrators for carelessness

C.

Provide system administrators with job descriptions of employees and let them determine relevant access rights

D.

Require that access rights to IT systems be ordered by process owners based on user role descriptions

Full Access
Question # 97

A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:

“Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.” The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?

A.

A risk of spyware and malware.

B.

A risk of corporate espionage.

C.

A ransomware attack risk.

D.

A social engineering risk.

Full Access
Question # 98

Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?

A.

First-in. first-out method (FIFO).

B.

Last-in, first-out method (LIFO).

C.

Specific identification method.

D.

Average-cost method

Full Access
Question # 99

During a routine bank branch audit, the internal audit function observed that the sole security guard at the branch only worked part time. The chief audit executive (CAE) believed that this increased the risk of loss of property and life in the event of a robbery. The branch security manager informed the CAE that a full-time guard was not needed because the branch was in close proximity to a police station. Still, the CAE found this to be an unacceptable risk due to the recent increase in robberies in that area. Which of the following is the most appropriate next step for the CAE to take?

A.

Immediately report the issue to the board to ensure timely corrective actions are taken to resolve the risk

B.

Continue discussions with the security manager until he is persuaded and agrees to increase branch security

C.

Document the security manager’s decision to accept the risk in the audit workpapers

D.

Escalate the issue to the bank’s chief security officer to determine acceptability of the risk

Full Access
Question # 100

An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?

A.

Market analysis lo identify trends

B.

Services to manage and maintain the IT Infrastructure.

C.

Backup and restoration.

D.

Software testing and validation

Full Access
Question # 101

An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.

Which of the following terms would the investor most likely label this investment in her portfolio?

A.

A star

B.

A cash cow

C.

A question mark

D.

A dog

Full Access
Question # 102

Which of the following would be the best method to collect information about employees' job satisfaction?

A.

Online surveys sent randomly to employees.

B.

Direct onsite observations of employees.

C.

Town hall meetings with employees.

D.

Face-to-face interviews with employees.

Full Access
Question # 103

Which of the following would most likely serve as a foundation for individual operational goats?

A.

Individual skills and capabilities.

B.

Alignment with organizational strategy.

C.

Financial and human resources of the unit.

D.

Targets of key performance indicators

Full Access
Question # 104

During an audit of the payroll system, the internal auditor identifies and documents the following condition:

"Once a user is logged into the system, the user has access to all functionality within the system."

What is the most likely root cause for tins issue?

A.

The authentication process relies on a simple password only, which is a weak method of authorization.

B.

The system authorization of the user does not correctly reflect the access rights intended.

C.

There was no periodic review to validate access rights.

D.

The application owner apparently did not approve the access request during the provisioning process.

Full Access
Question # 105

Which of the following is required in effective IT change management?

A.

The sole responsibility for change management is assigned to an experienced and competent IT team

B.

Change management follows a consistent process and is done in a controlled environment.

C.

Internal audit participates in the implementation of change management throughout the organisation.

D.

All changes to systems must be approved by the highest level of authority within an organization.

Full Access
Question # 106

Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?

A.

Tampering

B.

Hacking

C.

Phishing

D.

Piracy

Full Access
Question # 107

Which of the following risks is best addressed by encryption?

A.

Information integrity risk.

B.

Privacy risk.

C.

Access risk.

D.

Software risk.

Full Access
Question # 108

Which of the following best describes owner's equity?

A.

Assets minus liabilities.

B.

Total assets.

C.

Total liabilities.

D.

Owners contribution plus drawings.

Full Access
Question # 109

For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?

A.

An incorrect program fix was implemented just prior to the database backup.

B.

The organization is preparing to train all employees on the new self-service benefits system.

C.

There was a data center failure that requires restoring the system at the backup site.

D.

There is a need to access prior year-end training reports for all employees in the human resources database

Full Access
Question # 110

Which of the following is a benefit from the concept of Internet of Things?

A.

Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.

B.

Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.

C.

Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.

D.

Data mining and data collection from internet and social networks is easier, and the results are more comprehensive

Full Access
Question # 111

According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?

A.

Security.

B.

Status.

C.

Recognition.

D.

Relationship with coworkers

Full Access
Question # 112

Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?

A.

Scope change requests are reviewed and approved by a manager with a proper level of authority.

B.

Cost overruns are reviewed and approved by a control committee led by the project manager.

C.

There is a formal quality assurance process to review scope change requests before they are implemented

D.

There is a formal process to monitor the status of the project and compare it to the cost baseline

Full Access
Question # 113

In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?

A.

Input controls

B.

Segregation of duties

C.

Physical controls

D.

Integrity controls

Full Access
Question # 114

Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze,

improve, and control. Which of the following best describes this approach?

A.

Six Sigma,

B.

Quality circle.

C.

Value chain analysis.

D.

Theory of constraints.

Full Access
Question # 115

Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?

A.

Deploys data visualization tool.

B.

Adopt standardized data analysis software.

C.

Define analytics objectives and establish outcomes.

D.

Eliminate duplicate records.

Full Access
Question # 116

An internal auditor discusses user-defined default passwords with the database administrator. Such passwords will be reset as soon as the user logs in for the first time, but the initial value of the password is set as "123456." Which of the following are the auditor and the database administrator most likely discussing in this situation?

A.

Whether it would be more secure to replace numeric values with characters.

B.

What happens in the situations where users continue using the initial password.

C.

What happens in the period between the creation of the account and the password change.

D.

Whether users should be trained on password management features and requirements.

Full Access
Question # 117

In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?

A.

A value-added network.

B.

A local area network.

C.

A metropolitan area network.

D.

A wide area network.

Full Access
Question # 118

Which of the following functions of a quality assurance and improvement program (QAIP) must be performed by personnel independent of the internal audit function?

A.

External assessments

B.

Communication of QAIP results to the board

C.

Disclosure of nonconformance

D.

Internal assessments

Full Access
Question # 119

Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?

A.

Train all employees on bring-your-own-device (BYOD) policies.

B.

Understand what procedures are in place for locking lost devices

C.

Obtain a list of all smart devices in use

D.

Test encryption of all smart devices

Full Access
Question # 120

Which of the following best describes a man-in-the-middle cyber-attack?

A.

The perpetrator is able to delete data on the network without physical access to the device.

B.

The perpetrator is able to exploit network activities for unapproved purposes.

C.

The perpetrator is able to take over control of data communication in transit and replace traffic.

D.

The perpetrator is able to disable default security controls and introduce additional vulnerabilities

Full Access
Question # 121

A one-time password would most likely be generated in which of the following situations?

A.

When an employee accesses an online digital certificate

B.

When an employee's biometrics have been accepted.

C.

When an employee creates a unique digital signature,

D.

When an employee uses a key fob to produce a token.

Full Access
Question # 122

Which of the following characteristics applies to an organization that adopts a flat structure?

A.

The structure is dispersed geographically

B.

The hierarchy levels are more numerous.

C.

The span of control is wide

D.

The tower-level managers are encouraged to exercise creativity when solving problems

Full Access
Question # 123

Which of the following would be the strongest control to prevent unauthorized wireless network access?

A.

Allowing access to the organization's network only through a virtual private network.

B.

Logging devices that access the network, including the date. time, and identity of the user.

C.

Tracking all mobile device physical locations and banning access from non-designated areas.

D.

Permitting only authorized IT personnel to have administrative control of mobile devices.

Full Access
Question # 124

To achieve conformance with the Global Internal Audit Standards, the chief audit executive must include which of the following activities in the quality assurance and improvement program (QAIP)?

A.

Require board oversight of the QAIP

B.

Assess Standards conformance for each individual assurance engagement

C.

Conduct a self-assessment at least once every five years

D.

Report the results of the QAIP to the board

Full Access
Question # 125

Which of the following scenarios would cause a chief audit executive (CAE) to immediately discontinue using any statements that would indicate conformance with the Global Internal Audit Standards in an audit report?

A.

The internal audit function used a risk-based approach to create the internal audit plan

B.

The engagement supervisor considered requests from senior management regarding engagements to include in the internal audit plan

C.

The CAE only accepted engagements that the internal audit function collectively had the knowledge to perform

D.

The activity under review restricted the internal audit function's ability to access records, impacting the audit results

Full Access
Question # 126

The budgeted cost of work performed is a metric best used to measure which project management activity?

A.

Resource planning.

B.

Cost estimating

C.

Cost budgeting.

D.

Cost control.

Full Access
Question # 127

Which of the following statements. Is most accurate concerning the management and audit of a web server?

A.

The file transfer protocol (FTP) should always be enabled.

B.

The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.

C.

The number of ports and protocols allowed to access the web server should be maximized.

D.

Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.

Full Access
Question # 128

When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?

A.

The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes.

B.

The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion.

C.

The risk that database administrators set up personalized accounts for themselves, making the audit time consuming.

D.

The risk that database administrators could make hidden changes using privileged access.

Full Access
Question # 129

A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?

A.

Incremental processing costs, incremental revenue, and variable manufacturing expenses.

B.

Joint costs, incremental processing costs, and variable manufacturing expenses.

C.

Incremental revenue, joint costs, and incremental processing costs.

D.

Variable manufacturing expenses, incremental revenue, and joint costs

Full Access
Question # 130

An internal audit function did not conform with the Global Internal Audit Standards in only one of many engagements, as the engagement was performed with a lack of adequate knowledge of the subject matter. Which of the following is appropriate in relation to declaring conformance with the Standards?

A.

The internal audit function can still declare conformance with the Standards for all engagements

B.

The internal audit function can still declare conformance with the Standards for all other engagements that satisfy the requirements

C.

The internal audit function can declare partial conformance with the Standards for all engagements

D.

The internal audit function needs to evaluate the impact of the nonconformance before it can declare nonconformance with the Standards

Full Access
Question # 131

Which of the following differentiates a physical access control from a logical access control?

A.

Physical access controls secure tangible IT resources, whereas logical access controls secure software and data internal to the IT system.

B.

Physical access controls secure software and data internal to the IT system, whereas logical access controls secure tangible IT resources.

C.

Physical access controls include firewalls, user IDs, and passwords, whereas logical access controls include locks and security guards.

D.

Physical access controls include input processing and output controls, whereas logical access controls include locked doors and security guards.

Full Access
Question # 132

An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC

resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?

A.

The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.

B.

Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.

C.

Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.

D.

Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.

Full Access
Question # 133

Which of the following statements about assurance maps is true?

A.

They help identify gaps and duplications in an organization’s assurance coverage

B.

They allow the board to coordinate activities of internal and external assurance providers

C.

They help identify which assurance provider is responsible for performing each audit listed in the annual internal audit plan

D.

They allow internal auditors to map competencies and specialty areas of the assurance providers in an organization

Full Access
Question # 134

Focus An organization has decided to have all employees work from home. Which of the following network types would securely enable this approach?

A.

A wireless local area network (WLAN ).

B.

A personal area network (PAN).

C.

A wide area network (WAN).

D.

A virtual private network (VPN)

Full Access
Question # 135

When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?

A.

Direct product costs

B.

Indirect costs

C.

Direct period costs

D.

Indirect period costs

Full Access
Question # 136

Which of the following statements is true regarding cost-volume-profit analysis?

A.

Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted

B.

Breakeven is the amount of units sold to cover variable costs

C.

Breakeven occurs when the contribution margin covers fixed costs

D.

Following breakeven, net operating income will increase by the excess of fixed costs less the variable costs per unit sold

Full Access
Question # 137

Which of the following statements is true regarding user-developed applications (UDAs)?

A.

UDAs are less flexible and more difficult to configure than traditional IT applications.

B.

Updating UDAs may lead to various errors resulting from changes or corrections.

C.

UDAs typically are subjected to application development and change management controls.

D.

Using UDAs typically enhances the organization's ability to comply with regulatory factors.

Full Access
Question # 138

According to IIA guidance, whose input must be considered when developing the annual internal audit plan?

A.

Operational management

B.

External auditors

C.

The CEO

D.

Internal assurance providers

Full Access
Question # 139

Which of the following security controls would provide the most efficient and effective authentication for customers to access these online shopping account?

A.

12-digit password feature.

B.

Security question feature.

C.

Voice recognition feature.

D.

Two-level sign-on feature

Full Access
Question # 140

Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?

A.

Higher cash flow and treasury balances.

B.

Higher inventory balances.

C.

Higher accounts receivable.

D.

Higher accounts payable.

Full Access
Question # 141

Which of the following is most appropriately placed in the financing section of an organization's cash budget?

A.

Collections from customers

B.

Sale of securities.

C.

Purchase of trucks.

D.

Payment of debt, including interest

Full Access
Question # 142

Which of the following best describes the type of control provided by a firewall?

A.

Corrective

B.

Detective

C.

Preventive

D.

Discretionary

Full Access
Question # 143

The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?

Favorable labor efficiency variance

Adverse labor rate variance

Adverse labor efficiency variance

Favorable labor rate variance

A.

1 and 2.

B.

1 and 4.

C.

3 and 4.

D.

2 and 3.

Full Access
Question # 144

Which of the following statements is true regarding multi-report summaries for members of senior management and the board?

A.

Multi-report summaries should be used to describe the work performed by the internal audit function

B.

In developing multi-report summaries, internal auditors should use multi-row and multi-column tables

C.

Multi-report summaries are not useful to boards that see every engagement report

D.

Multi-report summaries are readily developed if each finding is rated

Full Access
Question # 145

Which of the following is the most appropriate way to record each partner’s initial investment in a partnership?

A.

At the value agreed upon by the partners

B.

At book value

C.

At fair value

D.

At the original cost

Full Access
Question # 146

A company produces water buckets with the following costs per bucket:

Direct labor = 82

Direct material = $5

Fixed manufacturing = 83.50

Variable manufacturing = 82.50

The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.

Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?

A.

$9.50

B.

$10.50

C.

$11

D.

$13

Full Access
Question # 147

Which of the following attributes of data are cybersecurity controls primarily designed to protect?

A.

Veracity, velocity, and variety.

B.

Integrity, availability, and confidentiality.

C.

Accessibility, accuracy, and effectiveness.

D.

Authorization, logical access, and physical access.

Full Access
Question # 148

Several organizations have developed a strategy to open co-owned shopping malls. What would be the primary purpose of this strategy?

A.

To exploit core competence.

B.

To increase market synergy.

C.

To deliver enhanced value.

D.

To reduce costs.

Full Access
Question # 149

The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?

A.

To ensure proper segregation of duties

B.

To create a master repository of user passwords

C.

To enable monitoring for systems efficiencies

D.

To enable tracking of privileges granted to users over time

Full Access
Question # 150

A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services. Which of the following best describes the restaurants strategy?

A.

Diversification

B.

Vertical integration

C.

Risk avoidance

D.

Differentiation

Full Access
Question # 151

Which of the following statements Is true regarding the use of centralized authority to govern an organization?

A.

Fraud committed through collusion is more likely when authority is centralized.

B.

Centralized managerial authority typically enhances certainty and consistency within an organization.

C.

When authority is centralized, the alignment of activities to achieve business goals typically is decreased.

D.

Using separation of duties to mitigate collusion is reduced only when authority is centralized.

Full Access
Question # 152

The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?

A.

Commissions.

B.

Stock options

C.

Gain-sharing bonuses.

D.

Allowances

Full Access
Question # 153

Which of the following statements regarding flat and hierarchical internal audit functions is true?

A.

A flat structure creates an internal audit function that is highly knowledgeable and collaborative

B.

A hierarchical structure requires little supervision, and the work performed is consistent and reliable

C.

A flat structure allows for growth within the function and leads to the cultivation of diverse skills and fresh perspectives

D.

A hierarchical structure tends to result in a higher cost base due to higher salaries to retain auditors with high knowledge and experience

Full Access
Question # 154

Which of the following statements best describes the current state of data privacy regulation?

A.

Regulations related to privacy are evolving and complex, and the number of laws is increasing

B.

Most privacy laws are prescriptive and focused on organizations’ privacy rights

C.

The concept of data privacy is well established, privacy regulations are mature, and minimal regulatory changes are expected

D.

Because the concept of privacy is different around the world, data privacy is relatively unregulated

Full Access