Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
The spam filter removed Incoming communication that included certain keywords and domains.
The spam filter deleted commercial ads automatically, as they were recognized as unwanted.
The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.
The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
A false positive occurs when a system incorrectly identifies a legitimate item as a threat or an unwanted entity. In the case of a spam filter, a false positive happens when the filter mistakenly classifies a genuine email as spam, even though it is legitimate.
Option A: "The spam filter removed incoming communication that included certain keywords and domains."
This describes a general filtering mechanism but does not indicate a mistake. If the filter was correctly configured, it is not necessarily a false positive. (Incorrect)
Option B: "The spam filter deleted commercial ads automatically, as they were recognized as unwanted."
If the ads were indeed unwanted, this is a true positive, meaning the system worked correctly. (Incorrect)
Option C: "The spam filter routed to the 'junk' folder a newsletter that appeared to include links to fake websites."
If the newsletter contained suspicious links, the filter was functioning as designed. This is not necessarily an error. (Incorrect)
Option D: "The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday."
This is a clear example of a false positive because the email was not spam or malicious, yet the filter mistakenly blocked it. (Correct Answer)
IIA GTAG (Global Technology Audit Guide) on Cybersecurity and IT Risks: Discusses false positives and negatives in automated security controls.
IIA’s "Auditing IT Security Controls" Report: Emphasizes the need for tuning security filters to reduce false positives.
COBIT 2019 – DSS05.07 (Manage Security Services): Highlights the importance of minimizing false positives to ensure business communication is not disrupted.
Analysis of Each Option:IIA References:Thus, the correct answer is D. The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
Which of the following is a characteristic of big data?
Big data is often structured.
Big data analytic results often need to be visualized.
Big data is often generated slowly and is highly variable.
Big data comes from internal sources kept in data warehouses.
Big data refers to extremely large and complex datasets that require advanced analytics to extract insights. Effective visualization is a crucial step in making big data analytics actionable.
Let’s analyze the options:
A. Big data is often structured.
Incorrect. Big data can be structured, semi-structured, or unstructured. Many sources of big data (e.g., social media, sensor data, emails) are unstructured, making analysis more challenging.
B. Big data analytic results often need to be visualized. ✅ (Correct Answer)
Correct. Due to its complexity, big data analytics results must often be visualized using dashboards, charts, or graphs to communicate insights effectively.
Examples of visualization tools include Tableau, Power BI, and Google Data Studio.
C. Big data is often generated slowly and is highly variable.
Incorrect. Big data is typically generated rapidly and continuously (e.g., social media posts, IoT sensors, financial transactions). This relates to the "velocity" characteristic of big data.
D. Big data comes from internal sources kept in data warehouses.
Incorrect. Big data comes from both internal and external sources, including social media, cloud applications, and sensors. Additionally, data warehouses store structured data, whereas big data is often unstructured and stored in data lakes.
IIA GTAG – Auditing Big Data Analytics – Explores best practices for analyzing and visualizing big data.
COSO ERM Framework – Technology & Data Risk – Discusses the need for big data governance and visualization.
ISO/IEC 27032 – Cybersecurity and Data Analytics – Covers big data security and interpretation.
IIA Standard 2120 – Risk Management in Big Data Analytics – Focuses on internal auditors' role in overseeing data-driven decision-making.
IIA References:
Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?
The cash dividends received increase the investee investment account accordingly.
The investee must adjust the investment account by the ownership interest
The investment account is adjusted downward by the percentage of ownership.
The investee must record the cash dividends as dividend revenue
Accounting Treatment for Investments with Little Influence:
When an investee has little or no influence over an entity, it uses the cost method (or fair value method, if applicable) to account for the investment.
Under the cost method, cash dividends received are recorded as dividend revenue rather than adjusting the investment account.
IIA Standard 2120 - Risk Management:
Internal auditors must ensure that financial reporting aligns with applicable accounting standards.
Applicable Accounting Standards:
IFRS 9 (Financial Instruments) and U.S. GAAP (ASC 320 - Investments in Equity Securities) state that dividends received should be recognized as income in the period received.
A. The cash dividends received increase the investee investment account accordingly. (Incorrect)
This applies to the equity method, used when an entity has significant influence (usually 20-50% ownership).
Under the cost method, dividend income is recognized as revenue, not as an increase in the investment account.
B. The investee must adjust the investment account by the ownership interest. (Incorrect)
Adjusting the investment account for ownership percentage is a feature of the equity method, not the cost method.
C. The investment account is adjusted downward by the percentage of ownership. (Incorrect)
A downward adjustment only occurs under the equity method when dividends exceed earnings, indicating a return of capital.
Under the cost method, dividends are recorded as revenue.
Explanation of Answer Choice D (Correct Answer):Explanation of Incorrect Answers:Conclusion:When an investee has little influence, dividends are recorded as revenue (Option D), following IFRS 9 and U.S. GAAP standards.
IIA References:
IIA Standard 2120 - Risk Management
IFRS 9 - Financial Instruments
U.S. GAAP ASC 320 - Investments in Equity Securities
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
Monitoring network traffic.
Using whitelists and blacklists to manage network traffic.
Restricting access and blocking unauthorized access to the network
Educating employees throughout the company to recognize phishing attacks.
This attack was caused by a phishing email containing malware embedded in an Excel spreadsheet. The most effective way to prevent such attacks is employee awareness training, as human error is the leading cause of successful phishing attempts.
Understanding Phishing Attacks:
Phishing emails trick employees into opening malicious links or attachments, leading to malware infections and data breaches.
Cybercriminals often disguise emails as coming from trusted vendors or colleagues.
Why Employee Training is the Most Effective Control:
Employees must be trained to identify suspicious emails, attachments, and links.
Training reduces the likelihood of employees accidentally opening malicious files.
Many cybersecurity frameworks (e.g., NIST, ISO 27001, and CIS) emphasize employee awareness as the first line of defense.
Why the Other Options Are Less Effective Alone:
A. Monitoring network traffic. âŒ
Can detect unusual activity after an attack but does not prevent phishing attempts.
B. Using whitelists and blacklists to manage network traffic. âŒ
Helps filter harmful websites, but phishing emails often appear legitimate and may bypass filters.
C. Restricting access and blocking unauthorized access to the network. âŒ
Helps limit damage after malware enters the network but does not stop employees from opening phishing emails.
IIA GTAG (Global Technology Audit Guide) on Cybersecurity: Recommends employee awareness programs as a key control.
IIA Standard 2110 (Governance): Internal auditors should assess cybersecurity training programs.
NIST Cybersecurity Framework – PR.AT (Protect – Awareness and Training): Emphasizes the role of employee education in preventing cyber threats.
ISO/IEC 27001 – Security Awareness and Training (A.7.2.2): Requires organizations to implement cybersecurity awareness programs.
Step-by-Step Justification:IIA References:Thus, the correct answer is D. Educating employees throughout the company to recognize phishing attacks. ✅
An organization is considering outsourcing its IT services, and the internal auditor as assessing the related risks. The auditor grouped the related risks into three categories;
- Risks specific to the organization itself.
- Risks specific to the service provider.
- Risks shared by both the organization and the service provider
Which of the following risks should the auditor classify as specific to the service provider?
Unexpected increases in outsourcing costs.
Loss of data privacy.
Inadequate staffing.
Violation of contractual terms.
When an organization outsources IT services, risks can be categorized as:
Risks specific to the organization – Risks that arise internally within the company.
Risks specific to the service provider – Risks that are under the control of the third-party provider.
Shared risks – Risks that require joint management by both the organization and the service provider.
Let’s analyze the answer choices:
Option A: Unexpected increases in outsourcing costs.
Incorrect. While cost increases can be a risk, they are often a shared risk because the organization and the provider negotiate pricing terms.
Option B: Loss of data privacy.
Incorrect. Data privacy concerns are shared between the organization (which must ensure compliance with regulations like GDPR or CCPA) and the service provider (which must implement proper security controls).
Option C: Inadequate staffing.
Correct. The service provider is responsible for maintaining adequate staffing levels to deliver the contracted services effectively. If they fail to do so, service quality can deteriorate, posing risks to the organization.
IIA Reference: Internal auditors should assess vendor risk management, including the provider’s staffing capabilities. (IIA GTAG: Auditing IT Outsourcing)
Option D: Violation of contractual terms.
Incorrect. While the service provider may be responsible for upholding contract terms, the organization is also responsible for contract enforcement. This makes it a shared risk rather than one specific to the provider.
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization's critical data
A physical control is a security measure designed to protect assets, facilities, and personnel from physical threats such as fire, theft, or unauthorized access. Fire detection and suppression equipment (e.g., fire alarms, sprinklers, extinguishers) directly protects physical assets, making it a clear example of a physical control.
(A) Providing fire detection and suppression equipment. ✅
Correct. This is a direct physical security control that helps mitigate fire risks by detecting and suppressing fires.
IIA GTAG "Physical Security and IT Asset Protection" identifies fire detection as an essential physical security measure.
(B) Establishing a physical security policy and promoting it throughout the organization. âŒ
Incorrect. A policy is an administrative control, not a physical control. While important, it does not provide direct physical protection.
(C) Performing business continuity and disaster recovery planning. âŒ
Incorrect. This is a procedural control, not a physical one. Planning for disasters does not physically secure assets but instead prepares an organization for recovery.
(D) Keeping an offsite backup of the organization's critical data. âŒ
Incorrect. This is an IT security control, ensuring data availability rather than physically protecting assets.
IIA GTAG – "Physical Security and IT Asset Protection"
IIA Standard 2110 – Governance (Risk Management Controls)
COBIT Framework – Physical and Environmental Security Controls
Analysis of Answer Choices:IIA References:Thus, the correct answer is A, as fire detection and suppression equipment provides direct physical protection against fire-related risks.
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
Cash payback technique
Annual rate of return technique.
Internal rate of return method.
Net present value method.
The cash payback technique determines the time required to recover the initial capital investment from annual cash inflows. It is one of the simplest capital budgeting methods, focusing on liquidity and risk reduction.
The payback period helps management assess the risk of investment decisions.
Shorter payback periods indicate faster capital recovery, which is desirable for risk-averse firms.
The IIA’s Practice Guide: Financial Decision-Making supports the use of payback analysis for assessing capital investments.
B. Annual rate of return technique → Incorrect. This method calculates the percentage return on an investment but does not measure how long it takes to recover the investment.
C. Internal rate of return (IRR) method → Incorrect. IRR determines the discount rate at which the investment's net present value (NPV) is zero, but it does not calculate the payback period.
D. Net present value (NPV) method → Incorrect. NPV considers the time value of money but focuses on overall profitability, not the time required to recover initial investment.
IIA’s Global Internal Audit Standards on Capital Budgeting and Investment Analysis recommend payback period analysis for investment risk assessment.
IIA Standard 2130 – Control Self-Assessment highlights financial viability and risk analysis in investment decision-making.
COSO Enterprise Risk Management (ERM) Framework supports the use of the payback method for risk mitigation in capital projects.
Why Option A is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is A. Cash payback technique.
An internal auditor was asked to review an equal equity partnership, in one sampled transaction. Partner A transferred equipment into the partnership with a Self-declared value of 510 ,000, and Partner B contributed equipment with a self-declared value of 515,000. The capital accounts reach partner were subsequently credited with $12,500. Which of the following statements Is true regarding this transection?
The capital accounts of the partners should be increased by she original cost of the contributed equipment.
The capital accounts should be increased using a weighted average based by the current percentage of ownership.
No action is needed, as the capital account of each partner was increased by the correct amount,
The capital accounts of the partners should be increased by She fair market value of their contribution.
In an equal equity partnership, partners' capital accounts should reflect the fair market value (FMV) of assets contributed, rather than self-declared values or historical cost. The fair market value ensures equitable ownership distribution and accurate financial reporting.
Let’s analyze each option:
Option A: The capital accounts of the partners should be increased by the original cost of the contributed equipment.
Incorrect. The original cost (historical cost) of an asset is not relevant in partnership accounting. Instead, fair market value (FMV) is used to properly recognize each partner's contribution.
Option B: The capital accounts should be increased using a weighted average based on the current percentage of ownership.
Incorrect. While ownership percentages influence profit and loss distribution, initial capital contributions should be recorded at FMV, not a weighted average.
Option C: No action is needed, as the capital account of each partner was increased by the correct amount.
Incorrect. Since the partners contributed different self-declared values, the capital accounts may not be correctly recorded unless verified against FMV. The partnership agreement typically requires capital contributions to be valued based on FMV, not self-declared estimates.
Option D: The capital accounts of the partners should be increased by the fair market value of their contribution.
Correct. Fair market value (FMV) ensures that capital contributions are recorded accurately. Using self-declared values without verification can lead to misstatements in capital accounts and potential disputes.
IIA Reference: Internal auditors reviewing partnership accounting should ensure that capital accounts reflect fair market value to maintain financial accuracy. (IIA Practice Guide: Auditing Fair Value Estimates)
Thus, the verified answer is D. The capital accounts of the partners should be increased by the fair market value of their contribution.
If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?
Settlement of short-term obligations may become difficult.
Cash may be bed up in items not generating financial value.
Collection policies of the organization are ineffective.
The organization is efficient in using assets to generate revenue.
Working capital = Current Assets – Current Liabilities
A high amount of working capital compared to industry averages suggests that the organization may not be efficiently using its resources. This could mean that:
Excess cash is invested in inventory or accounts receivable, instead of being used for growth, investment, or shareholder returns.
The company may be holding too much inventory, which could lead to obsolescence or additional storage costs.
The business may have slow turnover in receivables, meaning cash is not being collected efficiently.
A. Settlement of short-term obligations may become difficult. (Incorrect)
A high working capital means the organization has sufficient assets to cover short-term obligations, so liquidity issues are unlikely.
B. Cash may be tied up in items not generating financial value. (Correct)
High working capital may indicate inefficient use of assets, such as excess inventory, high accounts receivable, or idle cash.
This can negatively impact return on assets (ROA) and overall financial performance.
C. Collection policies of the organization are ineffective. (Incorrect)
While high receivables can be a factor, working capital includes all current assets and liabilities, not just accounts receivable.
The issue could be inventory mismanagement or excess liquidity, not just collection policies.
D. The organization is efficient in using assets to generate revenue. (Incorrect)
A high working capital does not necessarily mean efficiency. In fact, it may indicate underutilized resources rather than optimized performance.
IIA GTAG 3 – Continuous Auditing: Implications for Internal Auditors highlights the importance of monitoring key financial metrics such as working capital.
IIA Practice Advisory 2130-1 – Assessing Organizational Performance emphasizes that internal auditors should assess whether financial resources are being used efficiently.
Financial Management Principles (IIA Guidance) discuss the impact of excessive working capital on liquidity and return on investment.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. Cash may be tied up in items not generating financial value.
Which of the following is true of matrix organizations?
A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.
A combination of product and functional departments allows management to utilize personnel from various Junctions.
Authority, responsibility and accountability of the units Involved may vary based on the project's life, or the organization's culture
It is best suited for firms with scattered locations or for multi-line, Large-scale firms.
Understanding Matrix Organizations:
A matrix organization is a hybrid structure that combines functional and project-based structures, where employees report to multiple managers (e.g., a functional manager and a project manager).
These organizations adapt to projects by adjusting authority, responsibility, and accountability based on the project's stage or the organization's culture.
Why Option C Is Correct?
In a matrix organization, roles and decision-making authority evolve based on the project's phase, size, or complexity.
Employees might report to different managers at different times, and accountability structures may change.
This aligns with IIA Standard 2110 – Governance, which emphasizes clear roles and responsibilities in dynamic organizational structures.
Why Other Options Are Incorrect?
Option A (Unity-of-command concept):
The unity-of-command principle states that employees should report to only one superior, which contradicts the nature of a matrix organization, where dual reporting exists.
Option B (Combination of product and functional departments allows management to utilize personnel from various functions):
While matrix organizations integrate product and functional departments, the key defining feature is the variable authority, responsibility, and accountability, making option C a better fit.
Option D (Best suited for firms with scattered locations or large-scale firms):
While matrix structures can be used in large firms, they are not limited to them and are often found in project-based industries (e.g., engineering, IT, consulting).
Matrix organizations adapt their authority structures based on project needs, making option C the best choice.
IIA Standard 2110 supports governance structures that evolve with organizational needs.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Organizational Structure & Accountability)
COSO ERM – Governance & Decision-Making in Matrix Organizations
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Lower costs.
Slower decision making at the senior executive level.
Limited creative freedom in lower-level managers.
Senior-level executives more focused on short-term, routine decision making
A flatter organizational structure reduces hierarchical levels and promotes greater autonomy for employees. The primary benefit is cost reduction due to fewer management layers and streamlined decision-making.
Fewer Management Layers – Reduces the number of mid-level managers, decreasing salary expenses.
Increased Operational Efficiency – Less bureaucracy leads to faster decision-making, lowering administrative costs.
Encourages Employee Autonomy – Reduces dependence on supervision, improving productivity.
B. Slower decision-making at the senior executive level – Incorrect because flatter structures lead to faster decision-making due to fewer approval levels.
C. Limited creative freedom in lower-level managers – Incorrect because flatter structures provide more autonomy and innovation opportunities.
D. Senior-level executives more focused on short-term, routine decision-making – Incorrect because executives in a flatter structure focus on strategic, high-level decisions, delegating routine tasks.
IIA’s GTAG on Governance and Risk Management – Discusses the financial and operational impacts of different organizational structures.
COSO’s Enterprise Risk Management (ERM) Framework – Emphasizes how flatter structures reduce operational inefficiencies and costs.
COBIT 2019 (Governance Framework) – Highlights the impact of organizational structure on financial performance.
Why Lower Costs is the Correct Answer?Why Not the Other Options?IIA References:
Which of the following best describes the primary objective of cybersecurity?
To protect the effective performance of IT general and application controls.
To regulate users' behavior it the web and cloud environment.
To prevent unauthorized access to information assets.
To secure application of protocols and authorization routines.
Cybersecurity is primarily focused on protecting information assets by preventing unauthorized access, data breaches, cyberattacks, and other security threats. The confidentiality, integrity, and availability (CIA) triad is the foundation of cybersecurity, with access control playing a key role in mitigating risks.
(A) Incorrect – To protect the effective performance of IT general and application controls.
While cybersecurity supports IT controls, its primary goal is information security, not just control performance.
(B) Incorrect – To regulate users' behavior in the web and cloud environment.
Cybersecurity includes user behavior policies, but its primary goal is preventing unauthorized access rather than regulation.
(C) Correct – To prevent unauthorized access to information assets.
The core objective of cybersecurity is to prevent unauthorized access, protecting data from cyber threats.
This aligns with the CIA (Confidentiality, Integrity, Availability) security model.
(D) Incorrect – To secure application of protocols and authorization routines.
Protocols and authorization routines are part of cybersecurity controls, but they are not the primary objective.
IIA’s GTAG (Global Technology Audit Guide) – Cybersecurity Risks and Controls
Defines cybersecurity as the protection of information assets from unauthorized access and threats.
NIST Cybersecurity Framework – Access Control and Information Security
Focuses on preventing unauthorized access to sensitive systems.
COBIT Framework – IT Governance and Security
Emphasizes the protection of data and IT assets through cybersecurity measures.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
With regard to project management, which of the following statements about project crashing Is true?
It leads to an increase in risk and often results in rework.
It is an optimization technique where activities are performed in parallel rather than sequentially.
It involves a revaluation of project requirements and/or scope.
It is a compression technique in which resources are added so the project.
Definition of Project Crashing:
Project crashing is a schedule compression technique used in project management to reduce the project completion time without changing its scope.
It involves adding extra resources (labor, equipment, budget) to critical path activities to complete them faster.
Key Aspects of Project Crashing:
Reduces project duration by increasing resources.
Leads to higher costs due to additional labor or expedited material procurement.
Used when project deadlines must be met and standard scheduling techniques are insufficient.
Why Other Options Are Incorrect:
A. It leads to an increase in risk and often results in rework:
While crashing can increase costs and risk, it does not necessarily result in rework unless poorly executed.
B. It is an optimization technique where activities are performed in parallel rather than sequentially:
This describes fast-tracking, not crashing. Fast-tracking involves overlapping tasks, while crashing adds resources to speed up tasks.
C. It involves a revaluation of project requirements and/or scope:
Crashing does not change project scope; it only shortens the schedule by allocating additional resources.
IIA’s Perspective on Project Risk and Management:
IIA Standard 2110 – Governance emphasizes the importance of project risk assessment, including schedule compression risks.
COSO ERM Framework identifies project cost overruns and resource misallocations as key risks in project execution.
PMBOK (Project Management Body of Knowledge) defines crashing as a schedule compression technique used when deadlines must be met at additional cost.
IIA References:
IIA Standard 2110 – Governance & Risk Oversight in Project Management
COSO Enterprise Risk Management (ERM) – Project Risk Considerations
PMBOK Guide – Schedule Compression Techniques (Crashing & Fast-Tracking)
Thus, the correct and verified answer is D. It is a compression technique in which resources are added so the project is completed faster.
An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?
Regular review of logs.
Two-level authentication.
Photos on smart cards.
Restriction of access hours.
The scenario describes a security breach where an employee’s smart card access was not updated after relocation. The best way to prevent such incidents is to regularly review access logs to detect and revoke outdated permissions.
Timely Detection of Unauthorized Access:
Regular log reviews allow security teams to identify anomalies, such as an employee accessing a location where they no longer work.
Access Control Auditing:
Periodic reviews help update access rights, ensuring that only authorized personnel have access to specific areas.
Compliance with Security Standards:
IIA Standard 2110 - Governance emphasizes ensuring security measures are effective.
ISO 27001 - Access Control Policies recommends regular access reviews to prevent unauthorized access.
B. Two-level authentication:
While multi-factor authentication enhances security, it would not remove outdated access rights from the system.
C. Photos on smart cards:
A photo helps in identity verification, but it does not prevent unauthorized access if the card remains active.
D. Restriction of access hours:
Limiting access times would not stop an unauthorized user from entering during valid hours.
IIA Standard 2110 - Governance: Internal auditors must assess IT and physical security controls.
IIA Standard 2120 - Risk Management: Ensures risks associated with unauthorized access are managed.
COBIT Framework - Identity and Access Management: Recommends reviewing user access logs for anomalies.
Key Reasons Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. Regular review of logs.
As it relates to the data analytics process, which of the following best describes the purpose of an internal auditor who cleaned and normalized cate?
The auditor eliminated duplicate information.
The auditor organized data to minimize useless information.
The auditor made data usable for a specific purpose by ensuring that anomalies were Identified and corrected.
The auditor ensured data fields were consistent and that data could be used for a specific purpose.
Data cleaning and normalization are essential steps in the data analytics process to ensure that data is accurate, complete, and useful for analysis. The primary purpose of these steps is to identify and correct anomalies, inconsistencies, and errors, making the data usable for decision-making.
(A) The auditor eliminated duplicate information. âŒ
Incorrect. Removing duplicates is one part of data cleaning, but it does not encompass the full process of making data usable.
(B) The auditor organized data to minimize useless information. âŒ
Incorrect. While organizing data helps improve efficiency, it does not necessarily involve error detection and correction, which is key to data cleaning.
(C) The auditor made data usable for a specific purpose by ensuring that anomalies were identified and corrected. ✅
Correct. The primary goal of cleaning and normalizing data is to detect and fix anomalies (e.g., missing values, inconsistencies, formatting errors), ensuring that data is reliable for analysis.
IIA GTAG "Data Analytics: Elevating Internal Audit Performance" highlights that correcting data anomalies is a critical step in preparing data for effective use.
(D) The auditor ensured data fields were consistent and that data could be used for a specific purpose. âŒ
Incorrect. While consistency in data fields is part of normalization, it does not fully address the broader purpose of identifying and fixing errors.
IIA GTAG – "Data Analytics: Elevating Internal Audit Performance"
IIA Standard 2320 – Analysis and Evaluation
NIST Data Quality Framework – Data Cleaning and Normalization
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as data cleaning and normalization ensure that anomalies are detected and corrected, making the data usable for a specific purpose
Which of the following application controls, implemented by management, monitors data being processed to ensure the data remains consistent and accurate?
Management trail controls
Output controls.
Integrity controls
input controls
Integrity controls are application controls designed to monitor data being processed to ensure that it remains accurate, consistent, and valid throughout its lifecycle. These controls help detect and prevent data corruption, unauthorized modifications, and inconsistencies in transactional systems.
Integrity controls enforce data validation, consistency checks, and reconciliation procedures to prevent errors during processing.
Examples include checksum validation, referential integrity constraints, and automated reconciliations to ensure data accuracy.
The IIA’s Global Technology Audit Guide (GTAG) 8 – Auditing Application Controls highlights integrity controls as a key measure in maintaining data reliability.
A. Management trail controls → Incorrect. These refer to audit trails and logs that track changes and actions within a system but do not actively monitor or correct data integrity.
B. Output controls → Incorrect. These focus on ensuring final reports, documents, or processed data outputs are accurate but do not monitor data during processing.
D. Input controls → Incorrect. These verify the accuracy and completeness of data at the point of entry, but they do not continuously monitor data throughout processing.
IIA GTAG 8 – Auditing Application Controls recommends integrity controls to maintain data accuracy.
IIA Standard 2120 – Risk Management states that internal auditors should assess data integrity risks in business processes.
ISACA’s COBIT Framework identifies data integrity as a key IT control objective.
Why Option C is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is C. Integrity controls.
A retail organization mistakenly did not include $10,000 of inventory in the physical count at the end of the year. What was the impact to the organization’s financial statements?
Cost of sales and net income are understated
Cost of sales and net income are overstated
Cost of sales is understated and net income is overstated
Cost of sales is overstated and net income is understated
Which of the following controls refers to requiring employees to use a combination of PINs, passwords, and/or biometrics to access an organization's smart device apps and data?
Remote wipe.
Software encryption.
Device encryption.
Authentication.
Comprehensive and Detailed In-Depth Explanation:
Authentication ensures that only authorized users can access a system by requiring credentials such as PINs, passwords, or biometrics.
Option A (Remote wipe) – Deletes data but does not control initial access.
Option B (Software encryption) – Protects stored data, not user access.
Option C (Device encryption) – Secures the device, but authentication controls access.
Since authentication ensures secure user verification, Option D is correct.
An internal auditor is reviewing results from software development integration testing. What is the purpose of integration testing?
To verify that the application meets stated user requirements.
To verify that standalone programs match code specifications.
To verify that the application would work appropriately for the intended number of users.
To verify that all software and hardware components work together as intended.
Integration testing is a phase in the software development lifecycle (SDLC) where individual components or systems are combined and tested as a group to ensure they work together correctly.
Ensures Component Compatibility – Confirms that different software modules and hardware components function correctly when integrated.
Identifies Data Flow Issues – Ensures seamless communication between software systems, databases, and external applications.
Detects System-Wide Errors – Finds defects that unit testing (individual module testing) may miss.
Prepares for System Testing – Integration testing is conducted before full system testing to ensure subsystems work together as expected.
A. To verify that the application meets stated user requirements.
This refers to User Acceptance Testing (UAT), not integration testing.
B. To verify that standalone programs match code specifications.
This describes unit testing, where individual components are tested separately.
C. To verify that the application would work appropriately for the intended number of users.
This describes performance or load testing, which measures system behavior under high user load.
IIA’s GTAG on IT Risks and Controls – Emphasizes the role of integration testing in ensuring secure and functional IT environments.
COBIT 2019 (Governance and Management of IT) – Recommends integration testing to reduce IT system failures.
ISO/IEC 25010 (Software Quality Model) – Lists integration testing as a key quality assurance step.
Why Option D is Correct?Why Not the Other Options?IIA References:
A rapidly expanding retail organisation continues to be tightly controlled by its original small management team. Which of the following is a potential risk in this vertically centralized organization?
Lack of coordination among different business units
Operational decisions are inconsistent with organizational goals
Suboptimal decision making
Duplication of business activities
In a vertically centralized organization, decision-making authority is concentrated at the top levels of management. As a company rapidly expands, maintaining tight control by a small management team can lead to inefficiencies, delays, and suboptimal decision-making due to limited input from operational and frontline staff.
Let’s analyze each option:
Option A: Lack of coordination among different business units
Incorrect. While coordination challenges can exist in a large, decentralized organization, a tightly controlled, centralized structure typically ensures strong coordination but at the cost of slower decision-making.
Option B: Operational decisions are inconsistent with organizational goals
Incorrect. In a centralized structure, top management closely controls decision-making, making goal misalignment less likely.
Option C: Suboptimal decision making
Correct.
Decentralized decision-making allows managers closer to operations to make informed, timely decisions.
A small centralized team may lack specialized knowledge about different departments, leading to inefficient or outdated decisions.
As the company expands, delays in decision-making and lack of responsiveness to market conditions increase risk exposure.
IIA Reference: Internal auditors assess organizational structures to identify risks associated with inefficient decision-making and control bottlenecks. (IIA Standard 2110: Governance)
Option D: Duplication of business activities
Incorrect. Duplication of activities is more common in decentralized structures, where different departments operate independently. A tightly controlled, centralized structure reduces redundancy but at the cost of decision-making efficiency.
Thus, the verified answer is C. Suboptimal decision making.
Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Rooting.
Eavesdropping.
Man in the middle.
Session hijacking.
Definition of Rooting:
Rooting (on Android) or Jailbreaking (on iOS) is the process of bypassing manufacturer and administrative security controls on a smart device.
This allows users to gain full control (root access) over the operating system, which can override security restrictions and allow installation of unauthorized applications.
How Rooting Increases Data Security Risks:
Bypassing Security Measures: Rooting removes built-in security protections, making the device more vulnerable to malware, unauthorized access, and data breaches.
Exposure to Malicious Apps: Rooted devices can install third-party applications that are not vetted by official app stores, increasing the risk of data theft, spyware, and ransomware attacks.
Circumventing Enterprise Security Policies: Many organizations use Mobile Device Management (MDM) to enforce security policies, but rooted devices can bypass these controls, exposing corporate data to cyber threats.
Increased Risk of Privilege Escalation Attacks: Attackers can exploit root access to take full control of the device, leading to unauthorized access to sensitive information.
IIA’s Perspective on Cybersecurity Risks:
IIA Standard 2110 – Governance emphasizes the importance of protecting sensitive data and ensuring compliance with IT security policies.
IIA’s GTAG (Global Technology Audit Guide) on Information Security warns against the dangers of rooted or jailbroken devices, as they compromise cybersecurity defenses.
NIST Cybersecurity Framework and ISO 27001 Information Security Standards identify unauthorized modifications to devices as a critical security risk.
Eliminating Incorrect Options:
B. Eavesdropping: This refers to intercepting communications (e.g., listening in on phone calls or network traffic) but does not involve circumventing administrative restrictions.
C. Man-in-the-Middle (MITM) Attack: This is an attack where an attacker intercepts and alters communication between two parties but does not involve rooting a device.
D. Session Hijacking: This attack involves stealing session tokens to impersonate a user but is unrelated to bypassing security controls on devices.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – Information Security Risks
NIST Cybersecurity Framework
ISO 27001 Information Security Standards
Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?
Periodic assessments
Ongoing monitoring
Full external assessments
Self-Assessment with Independent Validation (SAIV)
The QAIP (Quality Assurance and Improvement Program) requires both ongoing monitoring and periodic assessments. Among these, ongoing monitoring is the mechanism that ensures continuous evaluation of whether engagements are being performed with quality and in conformance with the Standards.
Option A (periodic assessments) review effectiveness but are not continuous. Option C (external assessments) and Option D (SAIV) are broader and periodic, not engagement-level consistency checks.
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software.
Updating operating software in a haphazard manner.
Applying a weak password for access to a mobile device.
Jailbreaking a locked smart device.
Comprehensive and Detailed In-Depth Explanation:
Jailbreaking a locked smart device (removing manufacturer-imposed restrictions) increases the risk of infringing on copyright and privacy laws, as it allows unauthorized access to software and applications.
Option A (Not installing anti-malware software) – Increases security risks but does not directly violate regulations.
Option B (Haphazard OS updates) – Can lead to vulnerabilities but is not a legal issue.
Option C (Weak passwords) – Poses a security threat but does not impact compliance with laws.
Since jailbreaking often violates software licenses and may lead to illegal use of software, Option D is the correct answer.
Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?
Risk tolerance.
Performance.
Threats and opportunities.
Governance.
Comprehensive and Detailed In-Depth Explanation:
Strategic initiatives are established to address emerging threats and opportunities in the business environment. Organizations continuously evaluate external and internal factors to remain competitive and mitigate risks.
Option A (Risk tolerance) influences strategy, but it is not the primary driver for creating new initiatives.
Option B (Performance) is an outcome rather than a primary driver.
Option D (Governance) provides structure but does not directly drive the need for new initiatives.
Since businesses prioritize initiatives in response to external threats and internal opportunities, option C is the correct answer.
Which of the following security controls would be appropriate to protect the exchange of information?
Firewalls.
Activity logs.
Antivirus software.
File encryption.
Comprehensive and Detailed In-Depth Explanation:
File encryption protects the confidentiality and integrity of information during transmission and storage. It ensures that only authorized recipients can access the data by converting it into an unreadable format.
Option A (Firewalls) – Prevents unauthorized access to networks but does not secure data exchange.
Option B (Activity logs) – Tracks actions but does not protect data confidentiality.
Option C (Antivirus software) – Protects against malware but does not encrypt data in transit.
Thus, file encryption (Option D) is the best security control for protecting exchanged information.
How do data analysis technologies affect internal audit testing?
They improve the effectiveness of spot check testing techniques.
They allow greater insight into high risk areas.
They reduce the overall scope of the audit engagement,
They increase the internal auditor's objectivity.
Understanding Data Analysis in Internal Auditing
Data analytics enhances audit testing by identifying patterns, anomalies, and high-risk transactions within large datasets.
Advanced analytics tools (e.g., AI, machine learning, continuous auditing) help auditors pinpoint areas of fraud, compliance violations, or operational inefficiencies.
Why Option B is Correct?
Data analysis improves risk assessment by allowing auditors to focus on high-risk areas, such as fraudulent transactions or control weaknesses.
IIA Standard 1220 – Due Professional Care requires auditors to use technology to improve audit effectiveness, including identifying risks.
IIA GTAG (Global Technology Audit Guide) 16 – Data Analytics supports using analytics to enhance risk-based auditing.
Why Other Options Are Incorrect?
Option A (Improves effectiveness of spot check testing techniques):
Data analysis enables continuous and full-population testing, rather than just improving spot checks.
Option C (Reduces the overall scope of the audit engagement):
Analytics refines audit focus but does not necessarily reduce the scope; it may expand testing capabilities.
Option D (Increases the auditor’s objectivity):
Objectivity is an ethical requirement rather than a direct effect of data analysis.
Data analytics enhances internal audit testing by providing deeper insights into high-risk areas.
IIA Standard 1220 and GTAG 16 emphasize data analytics in risk-based auditing.
Final Justification:IIA References:
IPPF Standard 1220 – Due Professional Care
IIA GTAG 16 – Data Analytics in Auditing
COSO Framework – Data-Driven Risk Management
Which of the following physical security controls is able to serve as both a detective and preventive control?
Authentication logs.
Card key readers.
Biometric devices
Video surveillance.
Which of the following principles s shared by both hierarchies and open organizational structures?
1. A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
2. A supervisor's span of control should not exceed seven subordinates.
3. Responsibility should be accompanied by adequate authority.
4. Employees at all levels should be empowered to make decisions.
1 and 3 only
1 and 4 only
2 and 3 only
3 and 4 only
Both hierarchies (traditional organizations with a clear chain of command) and open organizational structures (flatter, decentralized decision-making models) share certain fundamental management principles.
Let’s analyze each statement:
A superior can delegate the authority to make decisions but cannot delegate the ultimate responsibility for the results of those decisions.
Correct. In both hierarchical and open structures, managers can delegate decision-making authority, but they remain accountable for the outcomes.
IIA Reference: Internal auditors assess governance structures to ensure that accountability remains with senior management, even when authority is delegated. (IIA Standard 2110: Governance)
A supervisor's span of control should not exceed seven subordinates.
Incorrect. While some management theories suggest an ideal span of control, there is no universal limit of seven subordinates. The optimal number depends on factors like task complexity and organizational structure.
Responsibility should be accompanied by adequate authority.
Correct. Employees must have the necessary authority to fulfill their responsibilities effectively, regardless of the organizational structure.
IIA Reference: The IIA’s guidelines on effective governance and accountability emphasize the need for clear delegation of authority to ensure operational efficiency. (IIA Practice Guide: Organizational Governance)
Employees at all levels should be empowered to make decisions.
Incorrect. While this principle applies to open organizational structures, it does not align with traditional hierarchies, where decision-making authority is concentrated at higher levels.
Thus, the verified answer is A. 1 and 3 only.
Which of the following key performance indicators would serve as the best measurement of internal audit innovation?
The number of scheduled and completed audits and percentage of substantial recommendations
The board’s satisfaction index and internal audit staff commitment ratings
Internal audit staff’s application of technology in audit fieldwork and participation in professional organizations and publications
Internal audit staff’s compliance with the audit manual and technical knowledge in auditing, information security, and cloud computing issues
Innovation in internal audit is reflected in how the function applies new technologies, methodologies, and thought leadership. Measuring staff application of technology in audit fieldwork and their engagement in professional organizations/publications demonstrates innovation and forward-looking practices.
Options A, B, and D measure performance, satisfaction, or compliance but do not specifically address innovation.
Which of the following storage options would give the organization the best chance of recovering data?
Encrypted physical copies of the data, and their encryption keys are stored together at the organization and are readily available upon request.
Encrypted physical copies of the data are stored separately from their encryption keys, and both are held in secure locations a few hours away from the organization.
Encrypted reports on usage and database structure changes are stored on a cloud-based, secured database that is readily accessible.
Encrypted copies of the data are stored in a separate secure location a few hours away, while the encryption keys are stored at the organization and are readilyavailable.
Understanding Data Recovery and Security Risks:
Data must be protected, recoverable, and accessible when needed while maintaining security.
The best practice is to store encrypted backups offsite while keeping encryption keys separate but accessible.
Why Option D is Correct?
Storing encrypted data offsite (a few hours away) ensures protection against disasters (e.g., fire, cyberattacks, physical damage).
Keeping encryption keys at the organization ensures that recovery is quick and controlled without risking unauthorized access.
This aligns with the IIA's IT Audit Practices and ISO 27001 (Information Security Management), which emphasize separate storage of encrypted data and encryption keys for security and recoverability.
IIA Standard 2110 – Governance requires internal auditors to assess whether IT governance ensures the availability and security of critical data.
Why Other Options Are Incorrect?
Option A (Encrypted physical copies and keys stored together at the organization):
If both data and keys are in the same location, a disaster or breach would make recovery impossible.
Option B (Encrypted copies and keys stored in separate locations far away):
While secure, if encryption keys are stored too far, recovery could be delayed, impacting business continuity.
Option C (Encrypted usage reports in a cloud database):
This does not ensure full data recovery; it only provides logs and structure changes, not the actual data.
Storing encrypted data offsite while keeping encryption keys accessible onsite follows best IT security and disaster recovery practices.
IIA Standard 2110 supports evaluating IT governance, including data security and recovery controls.
Final Justification:IIA References:
IPPF Standard 2110 – Governance
ISO 27001 – Information Security Management
NIST SP 800-34 – Contingency Planning Guide for IT Systems
COBIT Framework – Data Security & Recovery Controls
Which of the following techniques would best detect an inventory fraud scheme?
Analyze Invoice payments just under individual authorization limits.
Analyze stratification of inventory adjustments by warehouse location.
Analyze inventory invoice amounts and compare with approved contract amounts.
Analyze differences discovered during duplicate payment testing
Detecting an inventory fraud scheme requires analyzing patterns of inventory adjustments, particularly across different locations. Fraudulent activities often involve unauthorized write-offs, stock transfers, or misstatements of inventory levels.
(A) Analyze invoice payments just under individual authorization limits.
Incorrect: This technique is useful for detecting procurement fraud or invoice splitting, but not directly related to inventory fraud.
(B) Analyze stratification of inventory adjustments by warehouse location. (Correct Answer)
Fraudulent inventory write-offs often occur in specific warehouses or locations where controls are weak.
Stratifying inventory adjustments helps identify abnormal patterns, such as excessive losses in one location.
IIA Standard 2120 (Risk Management) recommends data analytics and trend analysis to detect anomalies.
COSO ERM – Control Activities emphasizes monitoring and review of inventory adjustments to prevent fraud.
(C) Analyze inventory invoice amounts and compare with approved contract amounts.
Incorrect: This technique is effective for detecting overbilling or procurement fraud, but not inventory fraud, which involves physical stock manipulation.
(D) Analyze differences discovered during duplicate payment testing.
Incorrect: Duplicate payment testing helps uncover billing fraud, not inventory fraud.
IIA Standard 2120 – Risk Management: Encourages fraud detection through trend analysis and data monitoring.
IIA Practice Guide – Auditing Inventory Management: Suggests stratification of inventory adjustments to identify fraud.
COSO ERM – Control Activities: Recommends monitoring inventory transactions to prevent fraud.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because analyzing stratification of inventory adjustments by warehouse location helps detect irregular patterns indicative of fraud.
A company records income from an investment in common stock when it does which of the following?
Purchases bonds.
Receives interest.
Receives dividends
Sells bonds.
When a company invests in common stock, it can earn income in two primary ways:
Dividend income: When the company receives dividends, it recognizes the income.
Capital gains: When the stock is sold for a higher price than its purchase price, it results in a gain.
Why Option C (Receives dividends) is Correct:
Dividends represent income from an investment in common stock when declared and paid by the issuing company.
Under GAAP and IFRS, dividend income is recognized when received, not when declared.
Companies record dividends as investment income in their income statement.
Why Other Options Are Incorrect:
Option A (Purchases bonds):
Incorrect because purchasing bonds is an investment transaction, not income recognition.
Option B (Receives interest):
Incorrect because interest income applies to bond investments, loans, or deposits, not common stock investments.
Option D (Sells bonds):
Incorrect because selling bonds results in capital gains or losses, not regular investment income from common stock.
IIA Practice Guide – "Auditing Investment & Treasury Activities": Discusses the recognition of investment income.
IFRS 9 (Financial Instruments) & GAAP Standards: Provide guidance on recording dividends as investment income.
COSO Internal Control – Integrated Framework: Emphasizes proper financial reporting and income recognition.
IIA References:
Which of the following best describes meaningful recommendations for corrective actions?
Recommendations that address the gap between the condition and consequence and provide at least short-term fixes
Recommendations that address the gap between the criteria and condition and provide at least short-term fixes
Recommendations that address the gap between the criteria and consequence and provide long-term solutions
Recommendations that address the gap between the criteria and condition and provide long-term solutions
Meaningful recommendations are those that address the root cause of the condition by comparing it to the established criteria and propose sustainable, long-term solutions. This ensures that the identified issue will not recur and strengthens the control environment.
Option A relates to symptoms (condition vs. consequence), not root causes. Option B identifies the correct gap (criteria vs. condition) but offers only short-term fixes. Option C incorrectly compares criteria to consequence, which is not a valid basis for audit recommendations.
Thus, Option D is correct.
Which of the following is an established systems development methodology?
Waterfall.
Projects in Controlled Environments (PRINCE2).
Information Technology Infrastructure Library (ITIL).
COBIT
A systems development methodology refers to a structured approach used in software development and systems engineering to guide the design, development, and implementation of software applications.
Why Option A (Waterfall) is Correct:
Waterfall methodology is a linear and sequential systems development methodology where each phase (e.g., requirements, design, implementation, testing, deployment) must be completed before moving to the next.
It is widely established and historically one of the first software development methodologies.
Used in large-scale enterprise projects where detailed planning and structured execution are required.
Why Other Options Are Incorrect:
Option B (PRINCE2 - Projects in Controlled Environments):
Incorrect because PRINCE2 is a project management framework, not a systems development methodology.
Option C (ITIL - Information Technology Infrastructure Library):
Incorrect because ITIL is a set of IT service management (ITSM) best practices, not a software development methodology.
Option D (COBIT - Control Objectives for Information and Related Technologies):
Incorrect because COBIT is a governance framework for IT management and controls, not a development methodology.
IIA GTAG – "Auditing IT Projects and Systems Development": Highlights Waterfall as a traditional systems development methodology.
IIA’s Global Technology Audit Guide on IT Risks: Discusses software development lifecycle risks, including Waterfall methodology.
COBIT Framework – BAI03 (Manage Solutions Identification and Build): References structured methodologies like Waterfall in IT governance.
IIA References:
An organization prepares a statement of privacy to protect customers' personal information. Which of the following might violate the privacy principles?
Customers can access and update personal information when needed.
The organization retains customers' personal information indefinitely.
Customers reserve the right to reject sharing personal information with third parties.
The organization performs regular maintenance on customers' personal information.
Organizations must comply with privacy principles that emphasize data retention limitations. Keeping personal data indefinitely violates privacy laws and regulations such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA).
Privacy Regulations Require Data Minimization:
GDPR Article 5(1)(e) states that personal data should only be kept for as long as necessary for the intended purpose.
IIA GTAG 4: Management of IT Auditing also advises against excessive data retention.
Security and Risk Concerns:
Storing data indefinitely increases the risk of data breaches.
IIA Standard 2110 – Governance emphasizes the need for proper information security governance to protect personal data.
Legal and Compliance Issues:
Organizations are required to define retention policies to prevent unauthorized or unnecessary storage of personal data.
A. Customers can access and update personal information when needed. (Incorrect)
Reason: Allowing customers to access and update their information aligns with privacy principles such as data accuracy and transparency.
C. Customers reserve the right to reject sharing personal information with third parties. (Incorrect)
Reason: This supports data control rights, which is consistent with privacy standards like opt-in and opt-out policies.
D. The organization performs regular maintenance on customers' personal information. (Incorrect)
Reason: Regular maintenance (e.g., updates, corrections, deletions) enhances data accuracy and security, aligning with privacy best practices.
IIA Global Technology Audit Guide (GTAG) 4: Management of IT Auditing – Discusses data privacy principles.
IIA Standard 2110 – Governance – Ensures data security and regulatory compliance.
IIA GTAG 8: Auditing Application Controls – Covers data retention policies and privacy compliance.
Privacy Regulations: GDPR (Article 5), CCPA (Section 1798.105) – Require organizations to delete data once it is no longer needed.
Why is Indefinite Retention a Violation?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is B. The organization retains customers' personal information indefinitely.
According to IIA guidance on IT, which of the following best describes a logical access control?
Require complex passwords to be established and changed quarterly
Require swipe cards to control entry into secure data centers.
Monitor access to the data center with closed circuit camera surveillance.
Maintain current role definitions to ensure appropriate segregation of duties
Logical access controls are security measures that restrict electronic access to systems, applications, and data based on user roles and permissions. These controls ensure that only authorized personnel have access to specific functions or information.
Logical access controls enforce role-based access management, ensuring users only have permissions aligned with their job functions.
Proper role definitions help prevent fraud and unauthorized access by enforcing segregation of duties (SoD).
The IIA’s GTAG 4 – Management of IT Auditing highlights logical access as a core security control that supports SoD.
A. Require complex passwords to be established and changed quarterly → Incorrect. While strong passwords are an access control measure, they are not a comprehensive logical access control (they are part of authentication mechanisms).
B. Require swipe cards to control entry into secure data centers. → Incorrect. Swipe card access is a physical access control, not a logical access control.
C. Monitor access to the data center with closed-circuit camera surveillance. → Incorrect. CCTV surveillance is also a physical security control, not a logical access control.
IIA GTAG 4 – Management of IT Auditing emphasizes that logical access controls should be role-based and support segregation of duties.
IIA Standard 2110 – Governance states that organizations should maintain appropriate access controls to protect sensitive information.
NIST SP 800-53 (Security and Privacy Controls for Federal Information Systems) identifies logical access control as a fundamental cybersecurity measure.
Why Option D is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is D. Maintain current role definitions to ensure appropriate segregation of duties.
Which of the following facilitates data extraction from an application?
Application program code.
Database system.
Operating system.
Networks.
Data extraction involves retrieving data from various sources for processing or storage. Among the options provided, the database system is the component that facilitates data extraction from an application. Here's why:
A. Application Program Code:
While the application program code defines the logic and functionality of an application, it doesn't inherently provide mechanisms for data extraction. Instead, it interacts with databases to perform operations like data retrieval, insertion, or modification.
B. Database System:
A database system is designed to store, manage, and retrieve data efficiently. It offers structured methods, such as querying with SQL, to extract specific data as needed. Applications rely on the database system to access and extract the required data for various operations. For instance, in a relational database, data extraction is performed using SQL queries that retrieve data based on specified criteria. This process is fundamental to operations like reporting, analytics, and data migration.
teradata.com
C. Operating System:
The operating system manages hardware resources and provides services for application execution but doesn't directly handle data extraction from applications. It ensures that applications have the necessary environment to run but delegates data management tasks to the database systems.
D. Networks:
Networks facilitate data transmission between systems but don't directly extract data from applications. They provide the pathways for data to travel between clients and servers or between different systems but aren't responsible for the extraction process within an application.
In summary, the database system is the component that provides the necessary tools and methods for data extraction within an application, making option B the correct answer.
Which of the following are the most common characteristics of big data?
Visibility, validity, vulnerability
Velocity, variety, volume
Complexity, completeness, constancy
Continuity, control, convenience
Comprehensive and Detailed In-Depth Explanation:
Big data is commonly characterized by the "Three Vs":
Volume: The vast amount of data generated and collected.
Velocity: The speed at which new data is generated and the pace at which data moves.
Variety: The diverse types and sources of data, including structured, semi-structured, and unstructured formats.
These characteristics highlight the challenges and considerations in managing and analyzing big data. Options A, C, and D list attributes that, while relevant in certain contexts, do not encapsulate the core defining features of big data as effectively as option B.
An organization has decided to allow its managers to use their own smart phones at work. With this change, which of the following is most important to Include In the IT department's comprehensive policies and procedures?
Required documentation of process for discontinuing use of the devices
Required removal of personal pictures and contacts.
Required documentation of expiration of contract with service provider.
Required sign-off on conflict of interest statement.
When an organization allows managers to use their own smartphones at work under a Bring Your Own Device (BYOD) policy, IT security and risk management become critical. The most important policy and procedure to include would be documenting the process for discontinuing use of the devices to ensure data security, compliance, and risk mitigation when employees leave the company or change roles.
Data Security & Compliance: Ensuring that sensitive company data is removed securely when an employee leaves or replaces a device is crucial to prevent unauthorized access.
Access Control & Endpoint Management: The IT department needs a clear policy to revoke access to corporate applications and networks when a device is no longer in use.
Risk Mitigation: Unauthorized access to company systems through lost, stolen, or retired devices can lead to security breaches.
Option B (Required removal of personal pictures and contacts): Personal data does not impact company security and is irrelevant to corporate IT policies.
Option C (Required documentation of expiration of contract with service provider): This is the employee's responsibility, not the organization's, and does not address security risks.
Option D (Required sign-off on conflict of interest statement): While conflict of interest policies are important, they are unrelated to IT security concerns related to BYOD.
IIA’s GTAG (Global Technology Audit Guide) on Managing and Auditing IT Vulnerabilities emphasizes the importance of BYOD risk management, including clear procedures for device decommissioning.
IIA's Business Knowledge for Internal Auditing (CIA Exam Syllabus - Part 3) highlights IT governance frameworks that require policies for data access and security when using personal devices.
Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is A. Required documentation of process for discontinuing use of the devices.
According to IIA guidance, which of the following is a broad collection of integrated policies, standards, and procedures used to guide the planning and execution of a project?
Project portfolio.
Project development
Project governance.
Project management methodologies
Project governance refers to a broad collection of integrated policies, standards, and procedures that provide a framework for planning and executing projects. It establishes decision-making processes, accountability, and risk management controls to ensure that projects align with organizational objectives.
(A) Project portfolio. âŒ
Incorrect. A project portfolio refers to a collection of projects managed together to achieve strategic objectives. It does not specifically define the policies, standards, and procedures for project execution.
(B) Project development. âŒ
Incorrect. Project development focuses on designing, building, and testing a project, but it does not encompass governance structures like policies, standards, and oversight.
(C) Project governance. ✅
Correct. Project governance includes integrated policies, standards, and procedures that guide project planning, execution, and oversight.
IIA GTAG "Auditing IT Projects" emphasizes project governance as the primary control framework for managing project risks and ensuring alignment with organizational goals.
(D) Project management methodologies. âŒ
Incorrect. Project management methodologies (e.g., Agile, Waterfall, PRINCE2) provide structured approaches for executing projects but do not encompass the full governance framework.
IIA GTAG – "Auditing IT Projects"
IIA Standard 2110 – Governance (Project Risk Management)
COSO ERM Framework – Project Oversight and Risk Governance
Analysis of Answer Choices:IIA References:Thus, the correct answer is C (Project governance), as it provides the integrated policies, standards, and procedures needed for effective project oversight.
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software
Updating operating software in a haphazard manner,
Applying a weak password for access to a mobile device.
JoIIbreaking a locked smart device
Understanding BYOD Risks and Legal Implications
Bring-your-own-device (BYOD) policies allow employees to use personal devices for work, but they introduce compliance risks.
Jailbreaking is the process of bypassing manufacturer-imposed security restrictions on a device (e.g., iPhones or Android devices).
This significantly increases the risk of privacy law violations, copyright infringements, and security breaches.
Why Option D is Correct?
Jailbreaking allows users to:
Install unauthorized software, which may violate software licensing agreements and copyright laws.
Remove security restrictions, increasing exposure to data breaches, malware, and non-compliance with privacy regulations (e.g., GDPR, HIPAA, or CCPA).
Bypass digital rights management (DRM), leading to potential copyright infringement issues.
IIA Standard 2110 – Governance mandates that internal auditors evaluate IT risks, including legal compliance related to mobile device usage.
ISO 27001 – Information Security Management also highlights the risks of unapproved software on enterprise devices.
Why Other Options Are Incorrect?
Option A (Not installing anti-malware software):
While a security risk, this primarily exposes devices to cyber threats rather than directly causing regulatory infringements.
Option B (Updating operating software in a haphazard manner):
Irregular updates pose security risks, but they do not directly violate copyright or privacy laws.
Option C (Applying a weak password):
Weak passwords increase security risks, but they do not inherently cause regulatory infringements like jailbreaking does.
Jailbreaking increases risks of copyright infringement (through unauthorized apps) and privacy violations (by removing security controls).
IIA Standard 2110 and ISO 27001 emphasize legal and regulatory compliance in IT security audits.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT & Legal Compliance Risks)
ISO 27001 – Information Security Compliance
GDPR, HIPAA, and CCPA – Privacy Law Considerations for BYOD
According to IIA guidance, which of the following is an IT project success factor?
Streamlined decision-making, rather than building consensus among users.
Consideration of the facts, rather than consideration of the emotions displayed by project stakeholders.
Focus on flexibility and adaptability, rather than use of a formal methodology.
Inclusion of critical features, rather than inclusion of an array of supplementary features.
According to IIA guidance on IT project success, successful IT projects focus on delivering critical, high-value features that support business objectives rather than overloading with unnecessary features.
Let’s analyze each option:
A. Streamlined decision-making, rather than building consensus among users.
Incorrect. While efficient decision-making is important, user consensus is crucial to IT project success, as user adoption affects the outcome. Ignoring user feedback can lead to project failure.
B. Consideration of the facts, rather than consideration of the emotions displayed by project stakeholders.
Incorrect. Stakeholder emotions and concerns must be managed properly. Ignoring stakeholder engagement can lead to resistance and project failure.
C. Focus on flexibility and adaptability, rather than use of a formal methodology.
Incorrect. IT projects must follow structured methodologies (Agile, Waterfall, etc.). A lack of formal methodology increases project risks.
D. Inclusion of critical features, rather than inclusion of an array of supplementary features. ✅ (Correct Answer)
Correct. IT projects should focus on delivering core, high-impact features that align with business needs. Adding too many non-essential features increases costs, complexity, and delays.
IIA GTAG (Global Technology Audit Guide) – Auditing IT Projects – Focuses on IT project governance and success factors.
COBIT Framework – IT Governance and Management – Emphasizes prioritization of key project features.
ISO/IEC 27001 – IT Risk Management – Discusses project management best practices.
IIA Standard 2110 – Governance – Covers IT project oversight and stakeholder management.
IIA References:Would you like me to verify more questions? 😊
When determining the level of physical controls required for a workstation, which of the following factors should be considered?
Ease of use.
Value to the business.
Intrusion prevention.
Ergonomic model.
When determining the level of physical controls required for a workstation, the most critical factor is its value to the business. Physical controls are security measures implemented to protect assets from unauthorized access, damage, or theft.
Asset Value → Determines the level of protection required.
Risk Assessment → Identifies threats like theft, sabotage, or natural disasters.
Compliance Requirements → Ensures alignment with security regulations and best practices.
(A) Ease of use.
Incorrect: While user-friendliness is important, security measures are primarily based on asset value and risk, not convenience.
IIA Standard 2110 (Governance) emphasizes security over ease of use.
(B) Value to the business. (Correct Answer)
The higher the workstation's importance to business operations, the stronger the physical controls required.
Workstations handling sensitive data or critical systems require additional security.
COSO ERM – Risk Assessment requires evaluating asset value when designing security controls.
(C) Intrusion prevention.
Partially correct but secondary: Intrusion prevention is one of many security concerns, but the primary driver for determining physical controls is the asset’s business value.
(D) Ergonomic model.
Incorrect: Ergonomics is about user comfort and efficiency, not security.
IIA Standard 2120 – Risk Management: Requires risk-based decision-making, including evaluating asset value.
GTAG 9 – Identity and Access Management: Stresses that security measures must align with asset value and business risk.
COSO ERM – Risk Assessment: Establishes asset value as a key determinant in risk-based security controls.
Factors Considered in Physical Security Decisions:Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because the level of physical controls should be determined based on how critical the workstation is to business operations.
Which of the following best explains why an organization would enter into a capital lease contract?
To increase the ability to borrow additional funds from creditors
To reduce the organization’s free cash flow from operations
To improve the organization’s free cash flow from operations
To acquire the asset at the end of the lease period at a price lower than the fair market value
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Whether customers are asked to renew their consent for their data processing at least quarterly.
Whether private data is processed in accordance with the purpose for which the consent was obtained?
Whether the organization has established explicit and entitywide policies on data transfer to third parties.
Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.
When reviewing personal data consent and opt-in/opt-out management processes, internal auditors should focus on ensuring compliance with data protection regulations, such as the General Data Protection Regulation (GDPR) and other applicable data privacy laws. The most critical aspect is ensuring that personal data is processed strictly in line with the consent obtained from individuals.
Data Processing in Accordance with Consent (Correct Choice: B)
IIA Standard 2110 – Governance requires internal auditors to assess whether the organization has effective processes for ensuring compliance with laws and regulations, including data privacy obligations.
GDPR Article 5(1)(b) (Purpose Limitation Principle) mandates that personal data must be collected for specified, explicit, and legitimate purposes and must not be further processed in a manner incompatible with those purposes.
Internal auditors should verify that the organization adheres to this principle by ensuring that data is only used for the purpose for which consent was granted.
Why the Other Options Are Incorrect:
Option A: "Whether customers are asked to renew their consent for their data processing at least quarterly." (Incorrect)
GDPR does not mandate a quarterly renewal of consent. Instead, it requires that consent be freely given, specific, informed, and unambiguous. Periodic renewal may be advisable in some cases, but it is not a strict regulatory requirement.
IIA Standard 2120 – Risk Management requires auditors to evaluate compliance risk exposure, but excessive consent renewals could lead to inefficiencies without adding value.
Option C: "Whether the organization has established explicit and entitywide policies on data transfer to third parties." (Incorrect)
While data transfer policies are critical (as required under GDPR Articles 44-50 on international data transfers), they do not directly relate to the opt-in/opt-out process or consent management.
IIA Standard 2201 – Engagement Planning encourages reviewing policies, but the key focus should be on processing data according to the purpose of consent.
Option D: "Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems." (Incorrect)
The right to be forgotten (GDPR Article 17) allows individuals to request data deletion, but it is not an opt-out feature in the traditional sense. Organizations must evaluate each request based on legal grounds before erasing data.
IIA Standard 2130 – Compliance requires verifying whether the organization ensures compliance with data privacy rights, but an opt-out for the right to be forgotten is not a primary audit focus.
IIA Standard 2110 – Governance (Ensuring regulatory compliance)
IIA Standard 2120 – Risk Management (Managing data privacy risks)
IIA Standard 2130 – Compliance (Reviewing legal obligations on personal data)
IIA Standard 2201 – Engagement Planning (Evaluating policies and controls)
GDPR Article 5(1)(b) – Purpose Limitation Principle (Processing data as per consent)
GDPR Articles 17, 44-50 (Data protection and right to be forgotten considerations)
Step-by-Step Justification for the Answer:IIA References for This Answer:Thus, Option B is the correct choice as it aligns with the purpose limitation principle and internal audit’s role in assessing compliance with data protection laws.
According to Herzberg’s Two-Factor Theory of Motivation, which of the following factors are mentioned most often by satisfied employees?
Salary and status.
Responsibility and advancement.
Work conditions and security.
Peer relationships and personal life.
Comprehensive and Detailed In-Depth Explanation:
Herzberg’s Two-Factor Theory identifies:
Motivators (Intrinsic factors) – Lead to job satisfaction (e.g., responsibility, recognition, growth).
Hygiene factors (Extrinsic factors) – Prevent dissatisfaction but do not create motivation (e.g., salary, work conditions).
Option A (Salary and status) – Hygiene factors that prevent dissatisfaction but do not drive motivation.
Option C (Work conditions and security) – Also hygiene factors, not motivators.
Option D (Peer relationships and personal life) – Affect job satisfaction indirectly, but are not primary motivators.
Since responsibility and advancement directly drive motivation, Option B is correct.
The internal audit activity has identified accounting errors that resulted in the organization overstating its net income for the fiscal year. Which of the following is the most likely cause of this overstatement?
Beginning inventory was overstated for the year.
Cost of goods sold was understated for the year.
Ending inventory was understated for the year.
Cost of goods sold was overstated for the year.
Understanding Net Income Overstatement:
Net Income (NI) = Revenue - Expenses
If net income is overstated, then expenses must be understated or revenue must be overstated.
Cost of Goods Sold (COGS) is an expense that directly affects net income.
Why Understated COGS Causes Overstated Net Income:
COGS = Beginning Inventory + Purchases - Ending Inventory
If COGS is understated, expenses are lower than they should be, resulting in a higher net income.
Why Other Options Are Incorrect:
A. Beginning inventory overstated: This would increase COGS (not decrease it), leading to a lower net income.
C. Ending inventory understated: This would increase COGS, reducing net income.
D. COGS overstated: This would result in a lower net income, not an overstatement.
IIA Standards and References:
IIA Standard 2120 – Risk Management: Internal auditors must assess financial misstatements and risks.
IIA Practice Guide: Auditing Financial Statement Close Processes (2018): Emphasizes accuracy in inventory and expense reporting.
COSO Internal Control – Integrated Framework: Supports accuracy in financial reporting and controls over misstated financial data.
Thus, the correct answer is B: Cost of goods sold was understated for the year.
An organization has an agreement with a third-party vendor to have a fully operational facility, duplicate of the original site and configured to the organization's needs, in order to quickly recover operational capability in the event of a disaster, Which of the following best describes this approach to disaster recovery planning?
Cold recovery plan,
Outsourced recovery plan.
Storage area network recovery plan.
Hot recovery plan
A hot recovery plan (hot site) is a fully operational, duplicate site that is pre-configured and ready for immediate use in case of a disaster. This approach allows an organization to recover critical operations quickly with minimal downtime.
(A) Cold recovery plan.
Incorrect: A cold site is a facility that has infrastructure but no active IT systems or data until set up after a disaster, resulting in longer recovery times.
(B) Outsourced recovery plan.
Incorrect: Outsourcing recovery refers to third-party disaster recovery services, but does not specifically describe a fully operational duplicate site.
(C) Storage area network recovery plan.
Incorrect: A storage area network (SAN) recovery plan focuses on data storage redundancy, not a fully operational duplicate facility.
(D) Hot recovery plan. (Correct Answer)
A hot site is the fastest and most effective disaster recovery solution, ensuring immediate failover with minimal downtime.
IIA GTAG 10 – Business Continuity Management highlights hot sites as the most effective for mission-critical operations.
IIA GTAG 10 – Business Continuity Management: Recommends hot sites for critical recovery scenarios.
IIA Standard 2120 – Risk Management: Emphasizes preparedness for disaster recovery planning.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) Hot recovery plan, as it ensures a fully operational backup site for immediate disaster recovery.
When should the results of internal quality assessments be communicated to senior management and the board?
At least once every five years
At least annually
Periodically, at the discretion of the chief audit executive
Only after the results have been validated by an external assessment
The CAE must communicate the results of the quality assurance and improvement program (QAIP), including internal assessments, to senior management and the board at least annually. This ensures that oversight bodies remain informed about the internal audit activity’s conformance with the Standards and opportunities for improvement.
Option A refers to external assessments, not internal quality reviews. Option C is too vague. Option D is incorrect, as validation is not required before reporting internal assessment results.
Which of the following types of date analytics would be used by a hospital to determine which patients are likely to require remittance for additional treatment?
Predictive analytics.
Prescriptive analytics.
Descriptive analytics.
Diagnostic analytics.
Definition of Predictive Analytics:
Predictive analytics uses historical data, machine learning, and statistical algorithms to forecast future outcomes.
In the healthcare sector, it is used to predict patient readmission rates and identify those at high risk of needing additional treatment.
How Predictive Analytics Applies to Hospitals:
Hospitals analyze patient histories, symptoms, treatments, and recovery rates to determine the likelihood of readmission.
Predictive models help healthcare providers take proactive measures, such as tailored post-discharge care plans, to reduce readmission risks.
This leads to better patient outcomes and cost savings.
Why Other Options Are Incorrect:
B. Prescriptive analytics:
Prescriptive analytics goes beyond prediction and provides recommendations for action. In this case, the hospital is only determining which patients are likely to require additional treatment, not recommending treatments.
C. Descriptive analytics:
Descriptive analytics focuses on summarizing past data without making predictions. It would be used to report on past patient admissions but not to predict future readmissions.
D. Diagnostic analytics:
Diagnostic analytics analyzes the causes of past events but does not forecast future patient readmissions.
IIA’s Perspective on Data Analytics in Decision-Making:
IIA GTAG (Global Technology Audit Guide) on Data Analytics emphasizes the role of predictive analytics in risk assessment and operational efficiency.
COSO ERM Framework supports predictive modeling as part of strategic risk management.
IIA References:
IIA GTAG – Data Analytics in Risk Management
COSO Enterprise Risk Management (ERM) Framework
NIST Big Data Framework for Predictive Analytics
The head of the research arid development department at a manufacturing organization believes that his team lacks expertise in some areas, and he decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
1. Favorable labor efficiency variance.
2. Adverse labor rate variance.
3. Adverse labor efficiency variance.
4. Favorable labor rate variance.
1 and 2
1 and 4
3 and A
2 and 3
Understanding Labor Variances in Cost Accounting:
Labor efficiency variance measures the difference between the actual hours worked and the standard hours allowed for actual production.
Labor rate variance measures the difference between the actual labor cost per hour and the standard rate set for labor.
Why Options 1 (Favorable Labor Efficiency Variance) and 2 (Adverse Labor Rate Variance) Are Correct?
Favorable Labor Efficiency Variance (1):
Hiring more experienced researchers should lead to higher productivity, meaning that the team completes tasks faster, reducing the total labor hours required.
This results in a favorable labor efficiency variance because less time is spent on the project than initially expected.
Adverse Labor Rate Variance (2):
More experienced employees command higher salaries, leading to an increase in labor costs per hour compared to the budgeted rate.
This results in an adverse labor rate variance because the actual wage rate exceeds the standard rate.
Why Other Options Are Incorrect?
Option 3 (Adverse Labor Efficiency Variance):
This would occur if the new hires were less productive, which contradicts the scenario.
Option 4 (Favorable Labor Rate Variance):
A favorable variance in labor rate occurs when labor costs are lower than expected, which is unlikely when hiring more experienced (higher-paid) employees.
Hiring more experienced employees improves efficiency (favorable efficiency variance) but increases wages (adverse rate variance).
IIA Standard 1220 – Due Professional Care requires auditors to consider operational efficiency in decision-making evaluations.
Final Justification:IIA References:
IPPF Standard 1220 – Due Professional Care
IIA Practice Guide – Assessing Business Performance Metrics
Which of the following contract concepts is typically given in exchange for the execution of a promise?
Lawfulness.
Consideration.
Agreement.
Discharge
Consideration is a fundamental element of a legally binding contract, referring to something of value exchanged between parties. It ensures that each party receives a benefit or suffers a legal detriment in return for the promise made.
Essential for Contract Enforceability – A contract must involve an exchange of value (e.g., money, services, goods, or a promise to act or refrain from acting).
Legal Reciprocity – Both parties must give and receive something of value to make the contract valid.
Distinguishes Contracts from Gifts – A gift is voluntary and does not require consideration, whereas a contract does.
A. Lawfulness – A contract must be lawful, but lawfulness is a requirement, not something exchanged.
C. Agreement – An agreement is part of a contract, but without consideration, an agreement is not legally binding.
D. Discharge – Discharge refers to ending a contract, not forming one.
IIA’s GTAG on Contract Management Risks – Highlights consideration as a key contract principle.
COSO’s Internal Control Framework – Covers contract law fundamentals in risk management.
Common Law and Uniform Commercial Code (UCC) – Define consideration as an essential element of a contract.
Why Consideration is the Correct Answer?Why Not the Other Options?IIA References:
An organization produces products X and Y. The materials used for the production of both products are limited to 500 Kilograms

(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows in order to maximize profit, how much of product Y should the organization produce each month?
$10 $13
2 kg
70 units
6 kg
120 units
50 units
60 units
70 units
1:20 units
To maximize profit with a limited material supply of 500 kg per month, the company should prioritize producing the product that generates the highest contribution margin per kg of material used.
Step 1: Calculate Contribution Margin Per Unit for Each ProductSince fixed costs are not relevant in this decision, we focus on the contribution margin per unit of raw material:
Selling price per unit = $10
Material cost per unit = 2 kg × $1/kg = $2
Contribution margin per unit = $10 - $2 = $8
Contribution margin per kg = $8 ÷ 2 kg = $4 per kg
Selling price per unit = $13
Material cost per unit = 6 kg × $1/kg = $6
Contribution margin per unit = $13 - $6 = $7
Contribution margin per kg = $7 ÷ 6 kg = $1.17 per kg
Product X ($4 per kg) is more profitable per kg than Product Y ($1.17 per kg).
To maximize profit, produce as many units of Product X as possible first, then allocate the remaining material to Product Y.
First, maximize production of Product X
Each unit of Product X requires 2 kg.
Maximum units of Product X = 500 kg ÷ 2 kg per unit = 250 units.
However, demand is only 70 units, so produce 70 units of Product X.
Material used for 70 units of X = 70 × 2 kg = 140 kg.
Material remaining = 500 kg - 140 kg = 360 kg.
Use remaining material for Product Y
Each unit of Product Y requires 6 kg.
Maximum units of Product Y = 360 kg ÷ 6 kg per unit = 60 units.
Produce 70 units of Product X (to meet demand).
Produce 60 units of Product Y (using the remaining material).
IIA GTAG 13: Business Performance Management – Discusses maximizing profit by prioritizing high contribution margin products.
IIA Practice Guide: Cost Analysis for Decision-Making – Covers constraints and resource allocation for maximizing profitability.
Product XProduct YStep 2: Prioritize Product with Higher Contribution Margin Per KgStep 3: Allocate Limited Material (500 kg)Final Decision:IIA References for Validation:Thus, B (60 units) is the correct answer because it optimally allocates the 500 kg of material to maximize profit.
Which of the following statements is accurate when planning for an external quality assurance assessment of the internal audit function?
The external assessment would include the audit function’s compliance with laws and regulations
The selected qualified assessor can be from the organization’s shared services team
The external assessment team members must work for an accounting firm
The frequency of the performance of assessments should be considered by the assessor
The external quality assessment must be performed at least once every five years. Therefore, the assessor must consider the frequency requirement when planning the review.
Option A is too narrow; the assessment evaluates conformance with the Standards, not just laws/regulations. Option B is incorrect because assessors must be independent of the organization. Option C is incorrect; assessors may come from various professional backgrounds, not just accounting firms.
Which of the following should be established by management during implementation of big data systems to enable ongoing production monitoring?
Key performance indicators.
Reports of software customization.
Change and patch management.
Master data management
When implementing big data systems, organizations must establish ongoing production monitoring to ensure system performance, efficiency, and reliability.
Why Option A (Key performance indicators) is Correct:
KPIs (Key Performance Indicators) measure the effectiveness and success of big data systems.
KPIs help track system efficiency, data processing speed, accuracy, and resource utilization during production.
Examples of KPIs in big data systems include data ingestion rate, processing time, query performance, system uptime, and error rates.
Why Other Options Are Incorrect:
Option B (Reports of software customization):
Incorrect because software customization reports document system modifications but do not monitor system performance.
Option C (Change and patch management):
Incorrect because change and patch management deals with software updates and security fixes, not ongoing performance monitoring.
Option D (Master data management):
Incorrect because master data management focuses on data governance and consistency, not real-time system performance.
IIA GTAG – "Auditing Big Data Systems": Recommends using KPIs to measure the effectiveness of big data implementation.
COBIT 2019 – APO08 (Manage Performance and Capacity): Emphasizes KPI tracking for IT and data system performance.
NIST Big Data Framework: Highlights the importance of KPIs for monitoring big data system performance.
IIA References:
Which of the following disaster recovery plans includes recovery resources available at the site, but they may need to be configured to support the production system?
Warm site recovery plan.
Hot site recovery plan.
Cool site recovery plan.
Cold site recovery plan.
A disaster recovery plan (DRP) outlines how an organization will restore IT operations after a disruption. The type of recovery site determines how quickly systems can be brought back online.
Why a Warm Site Recovery Plan is Correct?A warm site is a partially configured backup location with some hardware and software ready, but it requires additional configuration before it can fully support production operations.
Faster than a Cold Site – Unlike a cold site, a warm site has pre-installed infrastructure, reducing downtime.
Requires Some Setup – Unlike a hot site, which is fully operational, a warm site needs configuration and software setup before use.
Balances Cost and Readiness – Less expensive than a hot site while offering faster recovery than a cold site.
B. Hot site recovery plan – A hot site is fully operational and can immediately take over in case of failure.
C. Cool site recovery plan – This is not a standard industry term in disaster recovery.
D. Cold site recovery plan – A cold site has only basic infrastructure (e.g., power and space) and lacks pre-installed hardware/software, requiring much more setup time.
IIA’s GTAG on Business Continuity Management – Defines recovery site options based on operational risk.
ISO 22301 (Business Continuity Management System) – Specifies warm sites as an intermediate recovery solution.
NIST SP 800-34 (Contingency Planning Guide for IT Systems) – Describes warm sites as partially pre-configured recovery environments.
Why Not the Other Options?IIA References:
For employees, the primary value of implementing job enrichment is which of the following?
Validation of the achievement of their goals and objectives
Increased knowledge through the performance of additional tasks
Support for personal growth and a meaningful work experience
An increased opportunity to manage better the work done by their subordinates
Which of the following can be classified as debt investments?
Investments in the capital stock of a corporation
Acquisition of government bonds.
Contents of an investment portfolio,
Acquisition of common stock of a corporation
Debt investments refer to financial instruments where an investor lends money to an entity (corporation, government, or institution) in exchange for periodic interest payments and the repayment of the principal amount at maturity. These include:
Government bonds (such as U.S. Treasury bonds, municipal bonds, and sovereign bonds)
Corporate bonds
Certificates of deposit (CDs)
Commercial paper
A. Investments in the capital stock of a corporation → Incorrect. Capital stock represents ownership (equity investments), not debt investments.
C. Contents of an investment portfolio → Incorrect. A portfolio may contain both equity and debt investments, making this too broad to classify specifically as debt.
D. Acquisition of common stock of a corporation → Incorrect. Common stock is an equity investment, not a debt investment.
The IIA’s Global Internal Audit Standards on Investment Management and Risk Assessment highlight debt instruments as fixed-income securities.
International Financial Reporting Standards (IFRS 9 – Financial Instruments) classify bonds and loans as debt investments, distinct from equity instruments.
The Generally Accepted Accounting Principles (GAAP) – FASB ASC 320 specifies how to account for debt securities.
Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is B. Acquisition of government bonds.
Which of the following responsibilities would ordinary fall under the help desk function of an organization?
Maintenance service items such as production support.
Management of infrastructure services, including network management.
Physical hosting of mainframes and distributed servers
End-to -end security architecture design.
A help desk function is responsible for providing technical support and maintenance services to end users. This includes troubleshooting issues, production support, and system maintenance rather than managing infrastructure or security architecture.
Let’s analyze each option:
Option A: Maintenance service items such as production support.
Correct. The help desk primarily provides user support, including:
Troubleshooting software and hardware issues
Resolving technical support requests
Assisting users with system access and operational questions
IIA Reference: Internal auditors assess IT service management, including help desk functions, to ensure efficient IT support and incident response. (IIA GTAG: Auditing IT Service Management)
Option B: Management of infrastructure services, including network management.
Incorrect. Infrastructure services (such as network and server management) fall under IT operations or network administration, not the help desk.
Option C: Physical hosting of mainframes and distributed servers
Incorrect. Hosting and maintaining physical servers is the responsibility of data center operations, not the help desk.
Option D: End-to-end security architecture design.
Incorrect. Security architecture design is handled by the IT security team or cybersecurity department, not the help desk.
Thus, the verified answer is A. Maintenance service items such as production support.
The internal audit function conducted an engagement on maintenance operations of a construction organization and identified several issues of medium importance. The head of maintenance proposed an improvement plan with deadlines and personnel responsible. The internal audit function issued the final report to senior management. Senior management was dissatisfied with the report as they believed that improvement plan deadlines should be considerably shorter. Which of the following should the internal audit function change in the reporting process?
Discontinue discussing draft reports with responsible employees, as their input is needed during fieldwork only
Involve senior management at the draft report stage and in the development of action plans
Request senior management to issue a separate memo regarding their changes to deadlines
Invite senior management to the board meeting regarding engagement results so that they can express their concerns
Action plans should be agreed upon collaboratively, with both the responsible managers and senior management involved. Involving senior management earlier in the draft report and action plan stage ensures alignment on deadlines and accountability before final issuance.
Option A would reduce input and transparency. Option C creates fragmented reporting. Option D is excessive and bypasses proper reporting procedures.
Which of the following organization structures would most likely be able to cope with rapid changes and uncertainties?
Decentralized
Centralized
Departmentalized
Tall structure
A decentralized organizational structure allows decision-making authority to be distributed across various levels and locations, making it more flexible and adaptable to rapid changes and uncertainties.
Why Decentralization Helps in Uncertainty?
Decentralization empowers different units or teams to make faster decisions.
It enables quick adaptation to market shifts, technological advancements, and external disruptions.
According to IIA’s Organizational Governance Guidelines, decentralized structures increase agility and responsiveness, particularly in dynamic industries like technology and finance.
Characteristics of Decentralized Structures:
Autonomy at multiple levels – decisions are not centralized at the top.
Faster decision-making – local teams react quickly to changes.
Greater innovation and flexibility – promotes problem-solving without bureaucratic delays.
Why Not Other Options?
B. Centralized:
A centralized structure concentrates decision-making at the top, slowing down responsiveness to changes.
C. Departmentalized:
While departmentalization organizes work efficiently, it may restrict cross-functional collaboration, making adaptation slower.
D. Tall Structure:
Tall structures have multiple management layers, leading to bureaucracy and slower decision-making.
IIA Practice Guide: Organizational Governance
IIA Standard 2110 – Governance and Risk Management
COBIT 2019 – Enterprise Risk and Governance Framework
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is A. Decentralized.
Which of the following statements is true regarding cost-volume-profit analysis?
Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.
Breakeven point is the amount of units sold to cover variable costs.
Breakeven occurs when the contribution margin covers fixed costs.
Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.
Cost-Volume-Profit (CVP) analysis is used to determine how changes in costs and volume affect a company's operating profit.
Correct Answer (C - Breakeven Occurs When the Contribution Margin Covers Fixed Costs)
Contribution Margin (CM) = Sales Revenue – Variable Costs.
The breakeven point is where total contribution margin equals total fixed costs, meaning the company has no profit or loss.
The IIA’s Practice Guide: Auditing Financial Performance supports this as the key breakeven definition.
Why Other Options Are Incorrect:
Option A (Contribution margin is the amount remaining after fixed expenses are deducted):
Incorrect because CM is calculated before fixed expenses are subtracted.
Option B (Breakeven point is the amount of units sold to cover variable costs):
Incorrect because breakeven covers fixed costs as well, not just variable costs.
Option D (Following breakeven, operating income increases by the excess of fixed costs less variable costs per unit sold):
Incorrect because operating income increases by the contribution margin per unit, not by the difference between fixed and variable costs.
IIA Practice Guide: Auditing Financial Performance – Defines breakeven analysis as when contribution margin covers fixed costs.
IIA GTAG 13: Business Performance – Discusses cost-volume-profit analysis for financial decision-making.
IIA References for Validation:Thus, C is the correct answer because breakeven occurs when the contribution margin equals fixed costs.
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization’s critical data
Which of the following describes the primary advantage of using data analytics in internal auditing?
It helps support the internal audit conclusions with factual evidence.
It reduces the time and effort needed to prepare the audit report.
It helps prevent internal auditors from unknowingly disregarding key process risks.
It enables internal auditors to meet their responsibility for monitoring controls.
Comprehensive and Detailed In-Depth Explanation:
Data analytics in internal auditing provides quantitative, evidence-based insights, enhancing audit conclusions and decision-making.
Option B (Reduces report preparation time) – While efficiency is a benefit, the main advantage is improved accuracy and factual support.
Option C (Prevents overlooking risks) – While true, data analytics primarily strengthens evidence collection.
Option D (Monitoring controls) – Auditors assess controls, but data analytics enhances findings through data-driven validation.
Thus, Option A is correct, as data analytics strengthens audit conclusions with factual evidence.
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
Cybercriminals hacking into the organization's time and expense system to collect employee personal data.
Hackers breaching the organization's network to access research and development reports
A denial-of-service attack that prevents access to the organization's website.
A hacker accessing she financial information of the company
When conducting a cybersecurity risk assessment, an internal auditor must evaluate the most significant threats based on their potential impact on the organization. In the pharmaceutical industry, intellectual property (IP), such as research and development (R&D) data, is one of the most valuable and sensitive assets.
(A) Cybercriminals hacking into the organization's time and expense system to collect employee personal data:While the loss of employee personal data is a serious concern due to privacy and regulatory implications (e.g., GDPR, CCPA), it does not pose as critical a threat as the loss of proprietary pharmaceutical research.
(B) Hackers breaching the organization's network to access research and development reports (Correct Answer):R&D reports contain proprietary drug formulas, clinical trial results, and patent-pending innovations, making them highly valuable to competitors and cybercriminals. A breach could lead to intellectual property theft, financial losses, loss of competitive advantage, and regulatory non-compliance (e.g., FDA, EMA requirements). This is considered the most significant threat because:
It could result in billions of dollars in lost revenue.
Competitors or state-sponsored hackers could exploit stolen research.
It could disrupt drug development and approval processes.
(C) A denial-of-service (DoS) attack that prevents access to the organization's website:While DoS attacks can damage an organization's reputation and disrupt operations, they generally do not cause the same level of financial or strategic harm as the loss of critical R&D data. Most organizations have cybersecurity measures (e.g., load balancers, CDNs) to mitigate DoS risks.
(D) A hacker accessing the financial information of the company:Unauthorized access to financial data can be serious, leading to fraud or reputational damage. However, publicly traded companies already disclose much of their financial data, and financial breaches typically have a lower long-term impact compared to intellectual property theft.
IIA Global Technology Audit Guide (GTAG) 15: Information Security Governance: Recommends that internal auditors prioritize risks that impact strategic assets, such as intellectual property.
IIA Standard 2120 - Risk Management: Requires internal auditors to evaluate the organization’s risk management processes, emphasizing risks with significant financial and operational consequences.
IIA Practice Advisory 2110-2: Assessing the Adequacy of Risk Management Processes: Highlights that internal auditors must identify risks that could threaten the organization’s long-term objectives, such as IP theft.
COSO ERM Framework: Encourages prioritization of risks that have high impact on an organization’s value and strategic objectives, such as cyber threats to proprietary research.
Analysis of Each Option:IIA References:Conclusion:Given the pharmaceutical industry's reliance on proprietary R&D, a breach compromising research reports represents the most significant cyber threat. Therefore, option (B) is the correct answer.
Which of the following inventory costing methods requires the organization to account for the actual cost paid for the unit being sold?
Last-in-first-Out (LIFO}.
Average cost.
First-in-first-out (FIFO).
Specific identification
The specific identification method is an inventory costing approach where the actual cost of each individual unit sold is recorded. This method is used when items are uniquely identifiable, such as in industries dealing with luxury goods, automobiles, or custom-manufactured products.
Correct Answer (D - Specific identification)
Under the specific identification method, each inventory unit is tracked separately, and its actual purchase cost is assigned to the cost of goods sold (COGS) when sold.
This method is commonly used for high-value, low-volume items where unique tracking is feasible.
The IIA’s GTAG 8: Audit of Inventory Management explains how different costing methods impact financial reporting and internal controls.
Why Other Options Are Incorrect:
Option A (LIFO - Last-in, First-out):
LIFO assumes that the most recent (last-in) inventory is sold first, but it does not track actual unit cost. Instead, it assigns the cost of the newest inventory to COGS.
LIFO is often used for tax benefits but does not follow actual unit cost identification.
Option B (Average cost):
The weighted average cost method calculates an average cost for all inventory units rather than assigning actual unit costs.
This method smooths out price fluctuations but does not track specific items' costs.
Option C (FIFO - First-in, First-out):
FIFO assumes that the oldest (first-in) inventory is sold first, assigning its cost to COGS.
However, like LIFO, it does not track individual unit costs.
IIA GTAG 8: Audit of Inventory Management – Explains different inventory costing methods, including specific identification.
IIA Practice Guide: Assessing Inventory Risks – Covers inventory valuation and fraud risks.
Step-by-Step Explanation:IIA References for Validation:Thus, the specific identification method (D) is the only one that accounts for the actual cost paid for each unit sold.
Which of the following best describes the use of predictive analytics?
A supplier of electrical parts analyzed an instances where different types of spare parts were out of stock prior to scheduled deliveries of those parts.
A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
A supplier of electrical parts analyzed all instances of a part being, out of stock poor to its scheduled delivery date and discovered that increases in sales of that part consistently correlated with stormy weather.
A supplier of electrical parts analyzed sales and stock information and modelled different scenarios for making decisions on stock reordering and delivery
Understanding Predictive Analytics:
Predictive analytics involves using historical data, statistical algorithms, and machine learning techniques to forecast future trends and behaviors.
It applies assumptions and models patterns to predict outcomes, helping businesses make proactive decisions.
Why Option B is Correct:
Predictive analytics is forward-looking and uses assumptions (e.g., weather conditions) to predict where stock levels would decrease more quickly.
This aligns with the goal of predictive analytics: forecasting potential events before they occur.
Why Other Options Are Incorrect:
A. Analyzed instances where parts were out of stock before scheduled deliveries: This is descriptive analytics, as it looks at past data without making future predictions.
C. Analyzed past stockouts and found a correlation with stormy weather: This is diagnostic analytics, as it identifies past correlations but does not predict future trends.
D. Modeled different scenarios for stock reordering and delivery decisions: This is prescriptive analytics, which focuses on decision-making rather than predictions.
IIA Standards and References:
IIA GTAG on Data Analytics (2017): Highlights predictive analytics as a tool for forecasting risks and operational inefficiencies.
IIA Standard 1220 – Due Professional Care: Encourages auditors to use analytical techniques to anticipate potential issues.
COSO ERM Framework: Supports the use of predictive models to improve risk management and strategic planning.
Thus, the correct answer is B: A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
Initiation.
Planning.
Execution.
Monitoring.
ï‚· Understanding Resource Coordination in Project Management:
Resource coordination involves assigning and managing human, financial, and technological resources to ensure the project runs smoothly.
The Execution phase is when project plans are implemented, and resources are actively utilized.
ï‚· Why Execution?
During execution, the project manager must coordinate resources, monitor performance, and resolve conflicts to keep the project on track.
This phase involves managing teams, distributing tasks, and ensuring resources are used efficiently.
ï‚· Why Other Options Are Incorrect:
A. Initiation: Focuses on defining project objectives, scope, and feasibility but does not involve active resource coordination.
B. Planning: Deals with creating resource allocation plans but does not handle real-time coordination.
D. Monitoring: Involves tracking performance and making adjustments but does not actively assign or manage resources.
ï‚· IIA Standards and References:
IIA Practice Guide: Auditing Project Management (2020): Recommends evaluating resource management practices during the execution phase.
IIA Standard 2110 – Governance: Internal auditors should ensure project resources are managed effectively to achieve objectives.
PMBOK Guide – Project Resource Management: Specifies that resource coordination primarily happens in the execution phase.
Which of the following best describes a potential benefit of using data analyses?
It easily aligns with existing internal audit competencies to reduce expenses
It provides a more holistic view of the audited area.
Its outcomes can be easily interpreted into audit: conclusions.
Its application increases internal auditors' adherence to the Standards
Data analysis in internal auditing allows auditors to assess large volumes of data, identify trends, and uncover anomalies, leading to a more comprehensive understanding of the audit area.
Definition and Role of Data Analysis in Auditing:
Data analytics in internal auditing involves using software and algorithms to analyze vast datasets for fraud detection, risk assessment, and control effectiveness.
The IIA’s GTAG on Continuous Auditing emphasizes that data-driven audits enhance visibility into operations, supporting risk-based auditing.
Why a More Holistic View?
Data analytics allows internal auditors to:
Identify patterns and trends across the entire audit area.
Detect fraud and anomalies more efficiently.
Assess risks across multiple departments simultaneously.
As per IIA Standard 1220 (Due Professional Care), auditors must consider the use of technology-based audit techniques to improve their audit scope.
Why Not Other Options?
A. It easily aligns with existing internal audit competencies to reduce expenses:
While data analytics can reduce costs, its primary benefit is enhanced audit scope and effectiveness, not just cost-cutting.
C. Its outcomes can be easily interpreted into audit conclusions:
Data analytics can enhance audit conclusions, but the interpretation still requires auditor expertise.
D. Its application increases internal auditors' adherence to the Standards:
While data analytics aligns with IIA Standards, it is not the main reason for its adoption.
IIA GTAG – Continuous Auditing: Implications for Assurance & Monitoring
IIA Standard 1220 – Due Professional Care
IIA Standard 2120 – Risk Management
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is B. It provides a more holistic view of the audited area.
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?
It should be reported as an administrative expense on the income statement.
It should be reported as period cost other than a product cost on the management accounts
It should be reported as cost of goods sold on the income statement.
It should be reported on the balance sheet as part of inventory.
Indirect labor costs incurred in the production process are treated as part of manufacturing overhead. Since the cost was incurred on the last day of the year, it is likely that the related products are still in inventory rather than being sold.
Under Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS), indirect labor costs associated with manufacturing should be included in the cost of inventory until the related goods are sold.
Once the goods are sold, the cost will be transferred to the cost of goods sold (COGS) in the income statement.
A. It should be reported as an administrative expense on the income statement. (Incorrect)
Indirect labor related to manufacturing is classified as part of manufacturing overhead, not an administrative expense.
B. It should be reported as a period cost other than a product cost on the management accounts. (Incorrect)
Indirect labor in production is a product cost (i.e., a cost that is included in inventory and matched with revenues when the product is sold).
Period costs refer to expenses like selling and administrative costs, which are expensed immediately.
C. It should be reported as cost of goods sold on the income statement. (Incorrect)
Since the cost was incurred on the last day of the year, the related products have likely not yet been sold, meaning the cost remains in inventory.
D. It should be reported on the balance sheet as part of inventory. (Correct)
Manufacturing overhead, including indirect labor, is included in inventory (work-in-process or finished goods) on the balance sheet until the goods are sold.
IIA Practice Guide: Auditing Inventory Management emphasizes that manufacturing costs, including indirect labor, should be allocated properly to inventory.
IIA Standard 2330 – Documenting Information requires auditors to ensure proper financial reporting of costs in accordance with GAAP/IFRS inventory valuation principles.
IFRS (IAS 2 – Inventories) and GAAP (ASC 330 – Inventory) state that indirect production costs must be capitalized as inventory until sold.
Explanation of Answer Choices:IIA References:Thus, the correct answer is D. It should be reported on the balance sheet as part of inventory.
A large retail customer made an offer to buy 10,000 units at a special price of $7 per unit. The manufacturer usually sells each unit for $10. Variable manufacturing costs are $5 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
Fixed and variable manufacturing costs are less than the special offer selling price
The manufacturer can fulfill the order without expanding the capacities of the production facilities
Costs related to accepting this offer can be absorbed through the sale of other products
The manufacturer’s production facilities are currently operating at full capacity
Which of the following information security controls has the primary function of preventing unauthorized outside users from accessing an organization's data through the organization's network?
Firewall.
Encryption.
Antivirus.
Biometrics.
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules. It is the primary control for preventing unauthorized external access to an organization's network, making it the best answer.
A. Firewall (Correct Answer) – Firewalls prevent unauthorized access by filtering traffic, blocking malicious connections, and securing the network perimeter.
B. Encryption – While encryption protects data confidentiality, it does not actively prevent unauthorized access to a network.
C. Antivirus – Antivirus software protects against malware and viruses but does not prevent unauthorized network access.
D. Biometrics – Biometrics controls physical or logical access (e.g., fingerprint authentication) but does not secure a network from external threats.
IIA GTAG 15 – Information Security Governance highlights firewalls as a critical security control for network protection.
IIA IPPF Standard 2110 – Governance emphasizes the need for network security policies that include firewalls.
NIST SP 800-41 Rev. 1 – Guidelines on Firewalls and Firewall Policy states that firewalls are the first line of defense in securing organizational networks.
Explanation of Each Option:IIA References:
An internal auditor is assessing the risks related to an organization's mobile device policy. She notes that the organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems. Which of the following types of smart device risks should the internal
Auditor be most concerned about?
Compliance.
Privacy
Strategic
Physical security
Understanding Mobile Device Risks in an Organization:
When an organization allows third parties (vendors and visitors) to use outside smart devices to access its proprietary networks and systems, it introduces significant compliance risks.
These risks include violations of regulatory requirements, industry standards, and internal security policies.
Compliance Risks in Smart Device Usage:
Unauthorized Access: External users may bypass security controls, leading to data breaches or regulatory non-compliance (e.g., GDPR, HIPAA, or PCI-DSS violations).
Lack of Encryption and Data Protection: If smart devices access sensitive information without proper security protocols, the organization may fail to comply with industry regulations.
Failure to Enforce Mobile Device Management (MDM): Without proper policy enforcement, organizations risk failing audits and facing penalties.
Why Other Options Are Incorrect:
B. Privacy:
Privacy concerns relate to handling personal data, but in this scenario, the focus is on third-party access risks, which fall under compliance.
C. Strategic:
Strategic risks relate to long-term business objectives, whereas compliance risks are more immediate and regulatory in nature.
D. Physical security:
Physical security deals with preventing unauthorized access to buildings or devices, not cybersecurity risks from external smart devices.
IIA’s Perspective on Compliance and IT Security:
IIA Standard 2110 – Governance emphasizes the need to evaluate IT security risks, including third-party access risks.
IIA GTAG (Global Technology Audit Guide) on IT Risks highlights compliance risks in Bring Your Own Device (BYOD) and third-party access policies.
ISO 27001 Information Security Standard mandates controls to manage external device access risks.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – IT Risks and BYOD Policies
ISO 27001 Information Security Standard
NIST Cybersecurity Framework for Mobile Device Security
Thus, the correct and verified answer is A. Compliance.
The engagement supervisor prepares the final engagement communication for dissemination. Since the chief audit executive (CAE) is on leave, the supervisor is delegated to disseminate the final engagement communication to all relevant parties. Who should be accountable for the final engagement communication?
Engagement supervisor
Chief audit executive
The board
The internal audit team
The CAE is ultimately accountable for all final engagement communications, even if dissemination is delegated to others. The Standards hold the CAE responsible for ensuring that reports are accurate, objective, clear, concise, constructive, complete, and timely.
Options A and D (supervisor or team) may assist but do not hold accountability. Option C (the board) receives reports but is not responsible for them.
Which of the following measures the operating success of a company for a given period of time?
Liquidity ratios.
Profitability ratios.
Solvency ratios.
Current ratios.
Profitability ratios measure a company's ability to generate profit over a specific period, making them the best indicators of operating success. These ratios assess financial performance by comparing income to various financial metrics such as revenue, assets, and equity.
Correct Answer (B - Profitability Ratios)
Profitability ratios reflect how effectively a company generates income from its operations over a given period.
Key profitability ratios include:
Gross Profit Margin: Measures how efficiently a company produces goods and services.
Operating Profit Margin: Shows profitability from core operations.
Net Profit Margin: Indicates the percentage of revenue converted into profit.
Return on Assets (ROA): Measures how efficiently assets generate earnings.
Return on Equity (ROE): Assesses how well equity investments generate returns.
The IIA Practice Guide: Auditing Financial Performance emphasizes profitability ratios in evaluating operational success.
Why Other Options Are Incorrect:
Option A (Liquidity Ratios):
Liquidity ratios measure a company's ability to meet short-term obligations rather than its operating success.
Examples: Current Ratio, Quick Ratio.
IIA GTAG 13: Business Performance emphasizes that liquidity ratios relate to short-term financial health, not operating success.
Option C (Solvency Ratios):
Solvency ratios evaluate a company's ability to meet long-term financial obligations, not operating performance.
Examples: Debt-to-Equity Ratio, Interest Coverage Ratio.
Option D (Current Ratio):
The current ratio is a liquidity ratio, measuring whether a company can meet its short-term liabilities with current assets.
It does not directly assess profitability or operational success.
IIA Practice Guide: Auditing Financial Performance – Covers the role of profitability ratios in evaluating a company’s success.
IIA GTAG 13: Business Performance – Discusses financial analysis, including profitability, liquidity, and solvency metrics.
Step-by-Step Explanation:IIA References for Validation:Thus, profitability ratios (B) are the best measures of a company’s operating success over a period.
Which of the following authentication controls combines what a user knows with the unique characteristics of the user, respectively?
Voice recognition and token
Password and fingerprint
Fingerprint and voice recognition
Password and token
Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?
The organization sells inventory to an overseas subsidiary at fair value.
The local subsidiary purchases inventory at a discounted price.
The organization sells inventory to an overseas subsidiary at the original cost.
The local subsidiary purchases inventory at the depreciated cost.A
Transfer pricing regulations aim to prevent tax evasion and ensure that intercompany transactions reflect fair market value, preventing profit shifting to low-tax jurisdictions. Selling inventory at fair value (arm’s length price) aligns with regulatory requirements, reducing the risk of non-compliance.
(A) Correct – The organization sells inventory to an overseas subsidiary at fair value.
Ensuring that transactions reflect fair market value prevents regulatory violations.
Adhering to the arm’s length principle minimizes transfer pricing risks and potential tax penalties.
(B) Incorrect – The local subsidiary purchases inventory at a discounted price.
A discounted price could be seen as an attempt to shift profits between entities, increasing regulatory scrutiny.
(C) Incorrect – The organization sells inventory to an overseas subsidiary at the original cost.
Selling at the original cost does not account for market conditions, potential markup, and fair valuation.
Regulators may view this as non-compliance with the arm’s length principle.
(D) Incorrect – The local subsidiary purchases inventory at the depreciated cost.
Depreciated cost may not represent fair market value and could be interpreted as a tax avoidance mechanism.
IIA’s Global Internal Audit Standards – Compliance with Tax and Transfer Pricing Regulations
Emphasizes fair pricing in intercompany transactions to prevent regulatory violations.
OECD Transfer Pricing Guidelines
Reinforces the arm’s length principle as the standard for pricing related-party transactions.
COSO’s ERM Framework – Compliance Risk Management
Highlights the need for adherence to tax laws and fair-value pricing in financial transactions.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
The sole internal auditor of a municipality wants to implement proper supervision over internal audit workpapers. Which of the following would be the most appropriate?
According to the Global Internal Audit Standards, in this situation the internal auditor can perform a self-review of selected workpapers
Request each engagement client to conduct a review of a sample of workpapers at the end of the engagement
Ask the board or management to sign off on workpapers
Engage peer reviewers from other organizations with legal precautions in place
The Global Internal Audit Standards require that workpapers be properly supervised and reviewed to ensure quality and compliance. A sole auditor cannot perform a meaningful self-review (Option A). Having clients review workpapers (Option B) compromises independence. Having management or the board sign off (Option C) is also inappropriate as it undermines audit objectivity.
The most suitable solution is to arrange for peer reviews from external auditors or other organizations, with confidentiality and legal safeguards in place. This provides independent oversight while maintaining audit quality.
How should internal auditors respond when the manager of an area under review disagrees with a finding?
Escalate the disagreements to the CEO
Ignore the manager’s concerns and proceed with finalizing the audit report
Escalate the disagreements to the chief audit executive
Reperform the audit process where there are disagreements
When management disagrees with audit findings, the auditor should escalate the matter to the CAE. The CAE can determine whether to include both perspectives in the report or escalate further if unresolved. This ensures objectivity and fair representation.
Option A (escalation to CEO) is premature. Option B ignores management’s input, reducing objectivity. Option D (reperforming work) is only necessary if there is evidence the work was flawed, not simply because of disagreement.
A chief audit executive wants to implement an enterprisewide resource planning software. Which of the following internal audit assessments could provide overall assurance on the likelihood of the software implementation's success?
Readiness assessment.
Project risk assessment.
Post-implementation review.
Key phase review.
Planning (ERP) software implementation, to evaluate whether the organization is prepared for the change. This type of audit helps identify potential risks, resource availability, process gaps, and stakeholder alignment, which are critical for successful implementation.
A. Readiness assessment (Correct Answer) – This assessment evaluates if the organization has the necessary resources, technology, and processes in place for a successful ERP implementation.
B. Project risk assessment – While a project risk assessment identifies potential threats to project success, it does not provide an overall assurance on readiness before implementation.
C. Post-implementation review – This is conducted after the project is completed and does not help assess the likelihood of success before implementation.
D. Key phase review – This approach evaluates progress during implementation but does not provide enterprise-wide assurance before starting the project.
IIA GTAG 12 – Auditing IT Projects recommends a readiness assessment before launching major IT initiatives.
IIA IPPF Standard 2120 – Risk Management emphasizes identifying pre-implementation risks to improve project success.
COBIT 2019 – APO03 (Managed Enterprise Architecture) supports readiness evaluations before system rollouts.
Explanation of Each Option:IIA References:
Which of the following statements is true regarding the management-by-objectives method?
Management by objectives is most helpful in organizations that have rapid changes.
Management by objectives is most helpful in mechanistic organizations with rigidly defined tasks.
Management by objectives helps organizations to keep employees motivated.
Management by objectives helps organizations to distinguish clearly strategic goals from operational goals.
Understanding Management by Objectives (MBO):
MBO is a performance management approach where employees and managers set specific, measurable goals together.
The main purpose of MBO is to align individual objectives with organizational goals, enhancing motivation and engagement.
Why Option C (Helps Keep Employees Motivated) Is Correct?
Employee motivation improves when individuals understand how their efforts contribute to the organization’s success.
Setting clear objectives and allowing employees to participate in goal-setting increases job satisfaction and engagement.
IIA Standard 2120 – Risk Management supports frameworks like MBO that contribute to organizational performance and employee effectiveness.
Why Other Options Are Incorrect?
Option A (Most helpful in organizations with rapid changes):
MBO is less effective in rapidly changing environments because it relies on long-term goal setting.
Option B (Best in mechanistic organizations with rigid tasks):
MBO works better in adaptive, flexible organizations, not those with rigid structures.
Option D (Distinguishes strategic from operational goals):
MBO focuses on individual and team goals, not distinguishing strategic vs. operational goals.
MBO enhances employee motivation by involving them in goal-setting and performance tracking.
IIA Standard 2120 supports employee engagement strategies for better performance management.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management (Employee Engagement & Performance Management)
COSO ERM – Performance Measurement & Goal Alignment
An organization had a gross profit margin of 40 percent in year one and in year two. The net profit margin was 18 percent in year one and 13 percent in year two. Which of the following could be the reason for the decline in the net profit margin for year two?
Cost of sales increased relative to sales.
Total sales increased relative to expenses.
The organization had a higher dividend payout rate in year two.
The government increased the corporate tax rate
The net profit margin is calculated as:
Net Profit Margin=Net ProfitTotal Sales×100\text{Net Profit Margin} = \frac{\text{Net Profit}}{\text{Total Sales}} \times 100Net Profit Margin=Total SalesNet Profit​×100
The given data shows:
Gross profit margin (Revenue – Cost of Goods Sold) remained constant at 40% in both years.
Net profit margin declined from 18% in Year 1 to 13% in Year 2.
Since the gross profit margin remained unchanged, the cost of sales did not increase relative to sales. This eliminates Option A as a possible cause.
A decline in net profit margin while gross profit remains the same suggests an increase in operating expenses, interest, or taxes.
If the government increased the corporate tax rate, net income after taxes would be lower, leading to a reduced net profit margin.
The IIA’s GTAG 14 – Auditing Governance, Risk, and Compliance recommends analyzing external factors like tax rate changes when evaluating financial performance.
A. Cost of sales increased relative to sales → Incorrect. If this were true, gross profit margin would have declined, but it remained stable.
B. Total sales increased relative to expenses → Incorrect. If sales increased while expenses stayed constant, net profit margin would have increased, not decreased.
C. The organization had a higher dividend payout rate in year two → Incorrect. Dividends do not affect net profit margin, as they are paid out from net income after it is calculated.
IIA Standard 2120 – Risk Management states that auditors should analyze changes in financial performance due to external economic factors.
COSO ERM Framework highlights tax rate changes as a key risk factor in financial analysis.
IFRS (International Financial Reporting Standards) require companies to disclose changes in tax rates and their impact on profitability.
Why Option D is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is D. The government increased the corporate tax rate.
Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?
Analysis of the full population of existing data.
Verification of the completeness and integrity of existing data.
Continuous monitoring on a repetitive basis.
Analysis of the databases of partners, such as suppliers.
To identify very small control and transaction anomalies, internal auditors should analyze the entire dataset rather than a sample. Full population analysis increases the likelihood of detecting:
Unusual transaction patterns, including fraud, errors, and control weaknesses.
Rare or subtle anomalies that might be missed in sampling-based audits.
Machine-learning-based fraud detection and exception analysis.
A. Analysis of the full population of existing data. (Correct)
This approach ensures complete coverage, reduces sampling risk, and detects rare anomalies.
Modern data analytics tools allow auditors to analyze entire datasets efficiently.
B. Verification of the completeness and integrity of existing data. (Incorrect)
While data integrity checks ensure reliable data, they do not actively identify anomalies or suspicious patterns.
C. Continuous monitoring on a repetitive basis. (Incorrect, but relevant)
Continuous monitoring is useful for ongoing fraud detection, but it does not guarantee full anomaly detection unless it covers all transactions.
Full population analysis is more comprehensive for identifying small anomalies.
D. Analysis of the databases of partners, such as suppliers. (Incorrect)
While analyzing external data sources can uncover vendor fraud, it does not address internal control or transaction anomalies within the organization.
IIA GTAG 3 – Continuous Auditing recommends full population analysis as a best practice for anomaly detection.
IIA Standard 1220 – Due Professional Care requires auditors to use advanced analytical techniques to detect control weaknesses.
COSO Framework – Fraud Risk Management Guide suggests full transaction data analysis for effective fraud detection.
Explanation of Answer Choices:IIA References:Thus, the correct answer is A. Analysis of the full population of existing data.
How can the concept of relevant cost help management with behavioral analyses?
It explains the assumption mat both costs and revenues are linear through the relevant range
It enables management to calculate a minimum number of units to produce and sell without having to incur a loss.
It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions
It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action
Relevant cost refers to costs that will change depending on a specific business decision. It is crucial for decision-making as it helps management assess the financial impact of alternatives.
Relevant costs focus on future costs that differ between decision alternatives.
They help management analyze how different choices impact profitability.
This supports decision-making in areas such as pricing, outsourcing, and product discontinuation.
A. It explains the assumption that both costs and revenues are linear through the relevant range → Incorrect. While linear cost behavior is often assumed, it is not the primary purpose of relevant cost analysis.
B. It enables management to calculate a minimum number of units to produce and sell without having to incur a loss → Incorrect. This describes break-even analysis, not relevant cost analysis.
C. It enables management to predict how costs such as the depreciation of equipment will be affected by a change in business decisions → Incorrect. Depreciation is a sunk cost and is not considered relevant for decision-making.
The IIA’s Practice Guide: Financial Decision-Making and Internal Audit’s Role outlines how relevant cost analysis aids business strategy.
International Professional Practices Framework (IPPF) Standard 2120 states that internal auditors should assess management’s cost-analysis techniques.
Managerial Accounting Concepts (by IMA and COSO) emphasize relevant costs in strategic decision-making.
Why Option D is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is D. It enables management to make business decisions, as it explains the cost that will be incurred for a given course of action.
Which of the following would be most likely found in an internal audit procedures manual?
A summary of the strategic plan of the area under review
Appropriate response options for when findings are disputed by management
An explanation of the resources needed for each engagement
The extent of the auditor's authority to collect data from management
The internal audit procedures manual documents policies and procedures for conducting audit engagements, including steps to follow when issues arise, such as disputes with management regarding findings. It ensures consistency and standardization of audit practice.
Option A (strategic plan) and Option C (resources) are not part of audit procedures but rather part of planning or organizational documents. Option D (authority to collect data) belongs in the internal audit charter, not in the procedures manual.
Therefore, the correct answer is appropriate response options for disputes with management (Option B).
Which of the following is most appropriate for the chief audit executive to keep in mind when establishing policies and procedures to guide the internal audit function?
The nature of the internal audit function
The size of the organization
The size and maturity of the internal audit function
The structure of the organization
Policies and procedures should be tailored to the size and maturity of the internal audit function. A small or less mature function may require simpler procedures, while a large and well-established function may require more detailed and formalized guidance.
Option A (nature of audit) and D (organizational structure) are relevant but secondary. Option B (organization size) does not necessarily dictate internal audit’s needs as directly as its own size and maturity.
Which of the following is a systems software control?
Restricting server room access to specific individuals
Housing servers with sensitive software away from environmental hazards
Ensuring that all user requirements are documented
Performing of intrusion testing on a regular basis
System software controls refer to security measures and protocols that protect an organization's IT infrastructure from unauthorized access, cyber threats, and system failures. Intrusion testing (penetration testing) is a key system software control used to detect vulnerabilities in IT environments.
Correct Answer (D - Performing Intrusion Testing on a Regular Basis)
Intrusion testing is a critical system software security measure that helps identify weaknesses in software configurations and security defenses.
This falls under system software controls because it directly tests the security of operating systems, applications, and network software.
The IIA’s GTAG 11: Developing IT Security Audits highlights penetration testing as a necessary control for system software security.
Why Other Options Are Incorrect:
Option A (Restricting server room access to specific individuals):
This is a physical access control, not a system software control.
Option B (Housing servers away from environmental hazards):
This is an environmental control, focusing on disaster prevention rather than software security.
Option C (Ensuring that all user requirements are documented):
This relates to project documentation and system development, but it does not control software security.
IIA GTAG 11: Developing IT Security Audits – Recommends regular penetration testing as a system software control.
IIA Practice Guide: Auditing IT Security – Discusses system software security measures.
IIA References for Validation:Thus, D is the correct answer because intrusion testing is a core system software control ensuring security.
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
The business continuity management charter
The business continuity risk assessment plan
The business impact analysis plan
The business case for business continuity planning
An investor has acquired an organization that has a dominant position in a mature, slow-growth industry and consistently creates positive financial income. Which of the following terms would the investor most likely label this investment in her portfolio?
A star
A cash cow
A question mark
A dog
The management of working capital is most crucial for which of the following aspects of business?
Liquidity
Profitability
Solvency
Efficiency
Working capital management focuses on short-term assets and liabilities to ensure a business has enough cash and liquid assets to meet its short-term obligations. Effective management of working capital directly impacts liquidity, allowing an organization to maintain operational stability.
Let’s analyze each option:
Option A: Liquidity.
Correct.
Liquidity refers to an organization’s ability to meet its short-term obligations, such as payroll, supplier payments, and operational expenses.
Working capital management ensures sufficient cash flow and current assets to cover immediate liabilities, making liquidity the primary concern.
IIA Reference: Internal auditors assess financial risk by evaluating liquidity management and cash flow strategies. (IIA Practice Guide: Auditing Liquidity Risk Management)
Option B: Profitability.
Incorrect.
While working capital impacts profitability (e.g., through cost control and investment decisions), profitability is more related to revenue and cost management, not just liquidity.
Option C: Solvency.
Incorrect.
Solvency refers to a company's long-term financial stability and its ability to meet debts over time.
Working capital is a short-term financial measure and does not directly determine solvency.
Option D: Efficiency.
Incorrect.
Efficiency relates to resource utilization and operational effectiveness, which are indirectly affected by working capital management but are not its primary focus.
Thus, the verified answer is A. Liquidity.
Which of the following biometric access controls uses the most unique human recognition characteristic?
Facial comparison using photo identification.
Signature comparison.
Voice comparison.
Retinal print comparison.
Biometric access controls use unique physical or behavioral characteristics for identification and security. Among the listed options, retinal print comparison is the most unique and secure, as it relies on the intricate patterns of blood vessels in the retina, which are nearly impossible to replicate or alter.
(A) Facial comparison using photo identification.
Incorrect: Facial recognition is widely used but less unique than retinal scanning because it can be affected by lighting, aging, or facial hair.
IIA GTAG 9 – Identity and Access Management mentions facial recognition as a medium-security method.
(B) Signature comparison.
Incorrect: Signatures can be forged or changed over time, making this a low-security biometric method.
(C) Voice comparison.
Incorrect: Voice patterns are unique but can be affected by illness, background noise, or recording quality, reducing reliability.
(D) Retinal print comparison. (Correct Answer)
Retinal patterns are highly unique, more than fingerprints, and do not change over time.
Difficult to forge, making it the most secure biometric authentication method.
IIA GTAG 9 – Identity and Access Management ranks retinal scanning among the highest security biometric controls.
IIA GTAG 9 – Identity and Access Management: Discusses biometric authentication and ranks retinal scanning as one of the most secure options.
IIA Standard 2120 – Risk Management: Emphasizes strong authentication controls for access security.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) Retinal print comparison because it is the most unique, secure, and reliable biometric characteristic for authentication.
An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?
Horizontal analysis
Vertical analysis
Ratio analysis
Trend analysis
Vertical analysis expresses each financial statement item as a percentage of a base figure (e.g., revenue). In this case, the internal auditor calculates electricity and depreciation expenses as a percentage of revenue, which is a clear application of vertical analysis.
(A) Horizontal analysis:
Compares financial data across different periods to identify trends and growth.
The given scenario does not compare financial statements over time, making this incorrect.
(B) Vertical analysis (Correct Answer):
Expresses each line item as a percentage of a base figure (e.g., revenue for income statements, total assets for balance sheets).
In this case, electricity and depreciation expenses are calculated as a percentage of revenue, confirming vertical analysis.
(C) Ratio analysis:
Involves calculating financial ratios (e.g., profitability, liquidity, efficiency).
This scenario does not involve ratios but rather percentage-based comparisons, making it incorrect.
(D) Trend analysis:
Identifies patterns over multiple periods (e.g., revenue growth over five years).
The question does not involve time-based comparisons, so this answer is incorrect.
IIA Practice Guide: Internal Audit and Financial Reporting – Recommends vertical analysis for financial statement assessment.
IIA Standard 2320 – Analysis and Evaluation – Requires auditors to apply relevant analytical techniques, including percentage-based evaluations.
COSO Internal Control Framework – Financial Reporting Component – Supports financial data analysis techniques such as vertical and horizontal analysis.
Analysis of Each Option:IIA References:Conclusion:Since the auditor expressed financial statement items as a percentage of revenue, option (B) is the correct answer.
An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?
Conduct an inventory of access rights of all employees who have changed their position within the last year
Remove unneeded access rights for uncovered instances and reprimand system administrators for carelessness
Provide system administrators with job descriptions of employees and let them determine relevant access rights
Require that access rights to IT systems be ordered by process owners based on user role descriptions
The root cause is the lack of a structured process for updating access rights when employees change positions. The best recommendation is to establish a role-based access control system, where access rights are determined and approved by process owners, not left to administrators.
Option A is corrective but only retrospective. Option B wrongly blames administrators without addressing the systemic issue. Option C risks inconsistency, as administrators should not decide rights.
A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:
“Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.†The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?
A risk of spyware and malware.
A risk of corporate espionage.
A ransomware attack risk.
A social engineering risk.
The described situation is a classic social engineering attack, specifically a phishing or CEO fraud (business email compromise) attempt. Social engineering exploits human psychology rather than technical vulnerabilities. In this case, the attacker attempted to impersonate the CEO and trick the board member into making an unauthorized payment.
(A) Incorrect – A risk of spyware and malware.
Spyware and malware typically involve malicious software installed on a device, which is not the case here.
This attack relied on deception rather than malware to obtain unauthorized funds.
(B) Incorrect – A risk of corporate espionage.
Corporate espionage involves unauthorized data theft, sabotage, or insider threats.
The attacker here attempted financial fraud, not intellectual property theft.
(C) Incorrect – A ransomware attack risk.
Ransomware encrypts files and demands payment for decryption.
There is no mention of system encryption or ransom demands in this case.
(D) Correct – A social engineering risk.
The attacker impersonated the CEO and used urgency to manipulate the board member into processing a fraudulent payment.
This technique is a business email compromise (BEC) scam, a well-known social engineering tactic.
IIA’s GTAG (Global Technology Audit Guide) – Cybersecurity Risks and Controls
Discusses social engineering and its impact on financial fraud.
NIST Cybersecurity Framework – Social Engineering Threats
Defines social engineering tactics, including email impersonation and phishing.
COBIT Framework – Information Security Governance
Recommends controls to mitigate social engineering risks, such as employee training and email authentication mechanisms.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following represents an inventory costing technique that can be manipulated by management to boost net income by selling units purchased at a low cost?
First-in. first-out method (FIFO).
Last-in, first-out method (LIFO).
Specific identification method.
Average-cost method
The FIFO (First-In, First-Out) method values inventory based on the assumption that older, lower-cost inventory is sold first, leaving newer, higher-cost inventory in stock. During periods of rising prices, FIFO results in lower cost of goods sold (COGS) and higher net income, making it susceptible to manipulation by management.
(A) Correct – First-in, first-out method (FIFO).
FIFO lowers COGS when older, cheaper inventory is sold first, inflating net income.
Management can manipulate earnings by selectively selling older, lower-cost inventory.
(B) Incorrect – Last-in, first-out method (LIFO).
LIFO assumes newer, higher-cost inventory is sold first, resulting in higher COGS and lower net income.
LIFO is typically used to reduce taxable income, not to inflate net income.
(C) Incorrect – Specific identification method.
This method tracks the exact cost of each unit, eliminating the ability to manipulate costs easily.
(D) Incorrect – Average-cost method.
The average-cost method smooths out fluctuations in inventory costs, preventing significant income manipulation.
IIA’s Global Internal Audit Standards – Financial Reporting and Inventory Valuation Risks
Discusses inventory accounting methods and their impact on financial statements.
IFRS and GAAP Accounting Standards – Inventory Valuation
Defines how FIFO can be used to influence financial performance.
COSO’s ERM Framework – Financial Manipulation Risks
Identifies inventory valuation as an area where earnings management can occur.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
During a routine bank branch audit, the internal audit function observed that the sole security guard at the branch only worked part time. The chief audit executive (CAE) believed that this increased the risk of loss of property and life in the event of a robbery. The branch security manager informed the CAE that a full-time guard was not needed because the branch was in close proximity to a police station. Still, the CAE found this to be an unacceptable risk due to the recent increase in robberies in that area. Which of the following is the most appropriate next step for the CAE to take?
Immediately report the issue to the board to ensure timely corrective actions are taken to resolve the risk
Continue discussions with the security manager until he is persuaded and agrees to increase branch security
Document the security manager’s decision to accept the risk in the audit workpapers
Escalate the issue to the bank’s chief security officer to determine acceptability of the risk
When the CAE disagrees with local management’s acceptance of a risk, the next step is to escalate the issue to higher management responsible for the risk—in this case, the bank’s chief security officer. If senior management also accepts the risk and the CAE still considers it unacceptable, the matter should then be reported to the board.
Option A (direct to the board) skips the escalation chain. Option B is ineffective if the security manager has already decided. Option C alone does not address the CAE’s responsibility to escalate unacceptable risks.
An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?
Market analysis lo identify trends
Services to manage and maintain the IT Infrastructure.
Backup and restoration.
Software testing and validation
After upgrading to a new accounting software, it is critical to ensure that the system is functioning correctly and meets the organization's operational, compliance, and security requirements. The immediate priority should be software testing and validation to confirm that:
The upgrade was successfully implemented.
The system is free from major bugs or functionality errors.
Financial data integrity is maintained.
Compliance with accounting and regulatory standards is ensured.
(A) Market analysis to identify trends:
This is unrelated to post-upgrade activities. Market analysis is a strategic function typically handled by business intelligence or marketing teams, not IT software vendors.
(B) Services to manage and maintain the IT infrastructure:
While IT infrastructure maintenance is important, it is typically an ongoing operational task rather than an immediate post-upgrade activity.
(C) Backup and restoration:
While data backup should be completed before the software upgrade, restoration would only be necessary if the upgrade fails. However, this is a contingency plan, not a standard immediate post-upgrade activity.
(D) Software testing and validation (Correct Answer):
Immediately after an upgrade, software testing is critical to ensure that financial transactions, reporting, and other accounting functions operate correctly.
This includes user acceptance testing (UAT), integration testing, and validation against financial reporting requirements.
IIA Global Technology Audit Guide (GTAG) 8: Auditing Application Controls – Emphasizes the importance of testing and validating application functionality after implementation or upgrades.
IIA Standard 2110 - Governance – Requires internal auditors to assess whether IT governance supports the organization's strategic objectives, including testing new software for operational effectiveness.
COBIT (Control Objectives for Information and Related Technologies) Framework – Highlights the importance of post-implementation review to confirm that IT systems perform as expected.
Analysis of Each Option:IIA References:Conclusion:To ensure that the accounting software upgrade is successful and operationally sound, software testing and validation must be performed immediately. Therefore, option (D) is the correct answer.
An investor has acquired an organization that has a dominant position in a mature. slew-growth Industry and consistently creates positive financial income.
Which of the following terms would the investor most likely label this investment in her portfolio?
A star
A cash cow
A question mark
A dog
Understanding the BCG Matrix and Investment Classifications:
The Boston Consulting Group (BCG) Matrix classifies business investments into four categories:
Stars: High growth, high market share.
Cash Cows: Low growth, high market share.
Question Marks: High growth, low market share.
Dogs: Low growth, low market share.
Why the Investment is a Cash Cow:
The organization operates in a mature, slow-growth industry but has a dominant market position and generates consistent positive financial income.
This aligns with the definition of a Cash Cow, as it represents a stable and profitable business with low reinvestment needs.
Investors typically use Cash Cows to fund other investments, as they generate steady cash flow with minimal risk.
Why Other Options Are Incorrect:
A. A star:
A Star requires high growth and high market share, but the organization operates in a slow-growth industry, disqualifying it from this category.
C. A question mark:
A Question Mark is in a high-growth industry but lacks market dominance. Since this company is already dominant, it does not fit this category.
D. A dog:
A Dog has low growth and low market share, meaning it does not generate strong financial returns. The company described produces positive income, ruling out this category.
IIA’s Perspective on Business Strategy and Portfolio Management:
IIA Standard 2120 – Risk Management states that internal auditors must assess the strategic positioning of business investments.
COSO ERM Framework supports the use of strategic models like the BCG Matrix to evaluate investment performance and risk exposure.
IIA References:
IIA Standard 2120 – Risk Management and Strategic Planning
COSO Enterprise Risk Management (ERM) Framework
Boston Consulting Group (BCG) Matrix in Investment Analysis
Thus, the correct and verified answer is B. A cash cow.
Which of the following would be the best method to collect information about employees' job satisfaction?
Online surveys sent randomly to employees.
Direct onsite observations of employees.
Town hall meetings with employees.
Face-to-face interviews with employees.
The best method to collect job satisfaction data is one that provides anonymous, broad, and consistent feedback while minimizing response bias. Online surveys are the most effective method because they allow employees to express their views freely and ensure statistical reliability in results.
Online Surveys (Correct Answer: A)
Online surveys allow anonymous responses, which encourage honest feedback without fear of retaliation.
Surveys can be distributed randomly, increasing representation and reducing bias.
They allow for large-scale data collection and quantitative analysis, which improves decision-making.
IIA Standard 2120 – Risk Management suggests that internal auditors evaluate employee engagement as part of organizational risk assessments.
Why the Other Options Are Incorrect:
B. Direct Onsite Observations (Incorrect)
Observation helps assess behavior, but it does not capture employees' emotions, satisfaction, or personal concerns effectively.
Employees may alter their behavior when being observed (Hawthorne Effect).
C. Town Hall Meetings (Incorrect)
Town halls encourage group discussion, but employees may be reluctant to share negative opinions publicly.
This format is not anonymous, which reduces the likelihood of honest feedback.
D. Face-to-Face Interviews (Incorrect)
While interviews provide detailed qualitative feedback, they are time-consuming and may not be scalable for large organizations.
Employees may hesitate to be fully honest due to potential supervisor influence.
IIA Standard 2120 – Risk Management (Assessing employee engagement and morale risks)
IIA Standard 2130 – Compliance (Ensuring ethical and employee engagement policies)
IIA Standard 2210 – Engagement Objectives (Using appropriate methodologies for employee feedback collection)
Step-by-Step Justification:IIA References for This Answer:Thus, the best answer is A. Online surveys sent randomly to employees because they ensure confidentiality, broad participation, and reliable data collection.
Which of the following would most likely serve as a foundation for individual operational goats?
Individual skills and capabilities.
Alignment with organizational strategy.
Financial and human resources of the unit.
Targets of key performance indicators
Individual operational goals must align with an organization's overall strategy to ensure that employee efforts contribute to corporate success. Operational goals are specific, measurable objectives that support the broader strategic direction.
Why Option B (Alignment with organizational strategy) is Correct:
Organizational strategy defines the long-term vision, mission, and objectives.
Individual operational goals should align with this strategy to ensure consistency and effectiveness.
Strategic alignment ensures resources are used efficiently and performance contributes to corporate success.
Why Other Options Are Incorrect:
Option A (Individual skills and capabilities):
While important, skills alone do not define operational goals—they are tools to achieve goals.
Option C (Financial and human resources of the unit):
These resources support operational goals, but they do not serve as the foundation. Goals are set based on strategy first.
Option D (Targets of key performance indicators - KPIs):
KPIs measure performance but are not the basis for setting operational goals. Goals should align with strategy first, then KPIs track progress.
IIA Practice Guide – "Performance Management Auditing": Highlights strategic alignment as a basis for setting operational goals.
COSO ERM Framework – "Strategic and Performance Integration": Emphasizes aligning individual goals with organizational strategy.
IIA's Global Perspectives & Insights – "Auditing Organizational Performance": Discusses the role of strategy in goal-setting.
IIA References:Thus, the correct answer is B. Alignment with organizational strategy.
During an audit of the payroll system, the internal auditor identifies and documents the following condition:
"Once a user is logged into the system, the user has access to all functionality within the system."
What is the most likely root cause for tins issue?
The authentication process relies on a simple password only, which is a weak method of authorization.
The system authorization of the user does not correctly reflect the access rights intended.
There was no periodic review to validate access rights.
The application owner apparently did not approve the access request during the provisioning process.
The issue described suggests a systemic authorization flaw, where users gain unrestricted access once logged in. This points to an improperly configured authorization system, which should enforce role-based or least-privilege access to restrict users based on their job responsibilities.
(A) Incorrect – The authentication process relies on a simple password only, which is a weak method of authorization.
While weak authentication is a security risk, the issue described relates to excessive access permissions, not weak login credentials.
(B) Correct – The system authorization of the user does not correctly reflect the access rights intended.
The problem is that users have access to all functionality, which indicates an authorization issue, not an authentication flaw.
Proper role-based access controls (RBAC) should limit user permissions based on job functions.
(C) Incorrect – There was no periodic review to validate access rights.
While periodic reviews are important for detecting unauthorized access, the issue here is a system-level authorization design flaw rather than a failure in periodic reviews.
(D) Incorrect – The application owner apparently did not approve the access request during the provisioning process.
Even if an access request was approved incorrectly, the broader issue remains that all users have unrestricted access, which suggests a system misconfiguration rather than a single provisioning error.
IIA’s GTAG (Global Technology Audit Guide) – Access Control and Authorization
Emphasizes the need for role-based access control (RBAC) to prevent unauthorized access.
COBIT Framework – IT Security Governance
Discusses proper authorization mechanisms to align system access with business needs.
NIST Cybersecurity Framework – Access Management Controls
Recommends restricting access rights based on the principle of least privilege (PoLP).
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following is required in effective IT change management?
The sole responsibility for change management is assigned to an experienced and competent IT team
Change management follows a consistent process and is done in a controlled environment.
Internal audit participates in the implementation of change management throughout the organisation.
All changes to systems must be approved by the highest level of authority within an organization.
Effective IT Change Management Principles:
Change management ensures that modifications to IT systems are controlled, tested, and implemented in a way that reduces risks.
A structured and consistent process is required to prevent disruptions, maintain system integrity, and comply with governance requirements.
IIA Standard 2110 - Governance:
IT governance must include structured change management processes.
Change management should be repeatable and standardized to ensure effectiveness.
IIA GTAG (Global Technology Audit Guide) on Change Management:
Change management must be conducted in a controlled environment to minimize unintended consequences and security risks.
A. The sole responsibility for change management is assigned to an experienced and competent IT team. (Incorrect)
While IT plays a key role, change management should involve multiple stakeholders, including business units, security, compliance, and risk management teams.
IIA Standard 2120 - Risk Management states that risk oversight should not be assigned to a single function.
C. Internal audit participates in the implementation of change management throughout the organization. (Incorrect)
Internal audit evaluates change management but does not implement it.
IIA Standard 1000 - Purpose, Authority, and Responsibility emphasizes that internal audit provides independent assurance rather than operational involvement.
D. All changes to systems must be approved by the highest level of authority within an organization. (Incorrect)
Approvals should be based on a risk-based hierarchy rather than requiring executive-level approval for all changes.
IIA GTAG - Change Management recommends a tiered approval system based on change complexity and risk impact.
Explanation of Incorrect Answers:Conclusion:The most critical factor in effective IT change management is having a consistent, controlled process (Option B).
IIA References:
IIA Standard 2110 - Governance
IIA Standard 2120 - Risk Management
IIA Standard 1000 - Purpose, Authority, and Responsibility
IIA GTAG - Change Management
Which of the following risks would Involve individuals attacking an oil company's IT system as a sign of solidarity against drilling in a local area?
Tampering
Hacking
Phishing
Piracy
Hacking refers to unauthorized access to an IT system, typically with the intent to disrupt, steal, or manipulate data. In this scenario, activists attacking an oil company's IT system as a protest falls under hacking because they are illegally breaking into the company’s digital infrastructure to make a statement.
Let’s analyze each option:
Option A: Tampering
Incorrect. Tampering refers to physically altering or interfering with a system (e.g., changing sensor readings in an oil rig), rather than attacking an IT system digitally.
Option B: Hacking
Correct.
The individuals are gaining unauthorized access to the company’s IT system.
This action is commonly associated with hacktivism, where hackers attack organizations for political or ideological reasons.
IIA Reference: Internal auditors assess cybersecurity threats, including hacking and unauthorized access risks. (IIA GTAG: Auditing Cybersecurity Risks)
Option C: Phishing
Incorrect. Phishing involves tricking individuals into revealing sensitive information (e.g., login credentials) through fraudulent emails or websites, but this scenario describes a direct attack on the IT system.
Option D: Piracy
Incorrect. Piracy typically refers to copyright infringement (e.g., unauthorized software use) rather than hacking an IT system.
Thus, the verified answer is B. Hacking.
Which of the following risks is best addressed by encryption?
Information integrity risk.
Privacy risk.
Access risk.
Software risk.
Comprehensive and Detailed In-Depth Explanation:
Encryption is a security measure that protects the confidentiality of sensitive data by converting it into an unreadable format. This directly addresses privacy risks by preventing unauthorized access to personal or confidential information.
Option A (Information integrity risk) – Integrity controls (e.g., checksums, hash functions) address this risk.
Option C (Access risk) – Managed through authentication and access controls, not encryption.
Option D (Software risk) – Related to vulnerabilities, which encryption does not directly mitigate.
Since encryption protects privacy by securing sensitive data, Option B is correct.
Which of the following best describes owner's equity?
Assets minus liabilities.
Total assets.
Total liabilities.
Owners contribution plus drawings.
Owner’s equity represents the residual interest in a company’s assets after deducting liabilities. It is a fundamental concept in financial accounting, reflecting the net worth of a business.
Formula:Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Represents the True Value of Ownership – It measures the owner's claim on the business after settling all obligations.
Directly Tied to the Accounting Equation – Assets=Liabilities+Owner’s Equity\text{Assets} = \text{Liabilities} + \text{Owner’s Equity}Assets=Liabilities+Owner’s Equity Rearranging the equation: Owner’s Equity=Assets−Liabilities\text{Owner’s Equity} = \text{Assets} - \text{Liabilities}Owner’s Equity=Assets−Liabilities
Commonly Used in Financial Statements – Found in the Balance Sheet under the "Equity" section.
B. Total assets – Incorrect because assets include both owner-financed and liability-financed resources.
C. Total liabilities – Incorrect because liabilities represent debts owed, not ownership value.
D. Owner’s contribution plus drawings – Incorrect because it only considers investments and withdrawals, not retained earnings or net assets.
IIA’s GTAG on Business Financial Management – Discusses financial statement analysis, including owner’s equity.
COSO’s Internal Control – Integrated Framework – Highlights financial reporting accuracy, including equity calculations.
IFRS & GAAP Accounting Standards – Define owner’s equity as assets minus liabilities in financial reporting.
Why Option A is Correct?Why Not the Other Options?IIA References:
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
An incorrect program fix was implemented just prior to the database backup.
The organization is preparing to train all employees on the new self-service benefits system.
There was a data center failure that requires restoring the system at the backup site.
There is a need to access prior year-end training reports for all employees in the human resources database
The most recent backup is primarily used to restore lost data in the event of a system failure, data corruption, or cyberattack. If a data center failure occurs, the latest backup is the best source to recover the human resources database and resume operations.
(A) Incorrect – An incorrect program fix was implemented just prior to the database backup.
If an incorrect fix was applied before the backup, restoring the latest backup would still contain the error.
The organization would need to restore an earlier version before the faulty update.
(B) Incorrect – The organization is preparing to train all employees on the new self-service benefits system.
The latest backup is not needed for training; the live system or historical data would be used instead.
(C) Correct – There was a data center failure that requires restoring the system at the backup site.
In the event of a system failure, restoring from the most recent backup minimizes data loss and downtime.
This is the primary reason for maintaining regular backups.
(D) Incorrect – There is a need to access prior year-end training reports for all employees in the human resources database.
Historical records would likely be stored in archived backups or reports, not the latest backup.
The most recent backup contains current data, not old reports.
IIA’s GTAG (Global Technology Audit Guide) – IT Disaster Recovery and Backup Strategies
Covers the importance of backups in system restoration.
NIST Cybersecurity Framework – Data Recovery and Business Continuity
Recommends frequent backups to protect against system failures.
ISO 22301 – Business Continuity Management
Defines recovery procedures and best practices for backup site restoration.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following is a benefit from the concept of Internet of Things?
Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.
Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs.
Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.
Data mining and data collection from internet and social networks is easier, and the results are more comprehensive
The Internet of Things (IoT) refers to a network of interconnected physical devices that collect and exchange data through the internet. The key benefits of IoT include automation, improved decision-making, cost savings, and efficiency gains.
(A) Employees can choose from a variety of devices they want to utilize to privately read work emails without their employer’s knowledge.
This is incorrect because it focuses on unauthorized access rather than a benefit of IoT. Security and monitoring are major concerns in IoT environments.
IIA Standard 2110 – Governance requires organizations to ensure adequate governance structures for IT and data security.
(B) Physical devices, such as thermostats and heat pumps, can be set to react to electricity market changes and reduce costs. ✅
This is correct because IoT enables smart devices to automatically adjust based on real-time data.
Example: Smart thermostats (e.g., Nest, Honeywell) use IoT to track energy prices and consumption, adjusting temperatures to optimize efficiency.
IIA Practice Guide "Assessing the Governance of Risks in IT Projects" highlights IoT as a tool for operational efficiency and cost savings.
(C) Information can be extracted more efficiently from databases and transmitted to relevant applications for in-depth analytics.
This relates more to big data and data analytics, not necessarily IoT.
IIA GTAG "Auditing IT Governance" discusses IoT in operational efficiency but distinguishes it from data extraction.
(D) Data mining and data collection from the internet and social networks is easier, and the results are more comprehensive.
This describes AI and machine learning rather than IoT, which primarily connects physical devices.
IIA GTAG "Auditing Cybersecurity Risk" highlights IoT risks but does not emphasize social media data mining.
IIA GTAG (Global Technology Audit Guide) – "Auditing IT Governance"
IIA GTAG – "Assessing the Governance of Risks in IT Projects"
IIA Standard 2110 – Governance
IIA GTAG – "Auditing Cybersecurity Risk"
Analysis of Answer Choices:IIA References:Thus, the most appropriate answer is B because IoT improves efficiency by automating energy consumption based on market conditions.
According to Herzberg's Two-Factor Theory of Motivation, which of the following is a factor mentioned most often by satisfied employees?
Security.
Status.
Recognition.
Relationship with coworkers
Herzberg's Two-Factor Theory of Motivation divides workplace factors into:
Hygiene factors (which prevent dissatisfaction but do not increase satisfaction) – e.g., salary, security, relationships.
Motivators (which drive job satisfaction and performance) – e.g., recognition, achievement, responsibility, and personal growth.
Employees most often mention recognition as a key factor in job satisfaction, as it directly impacts motivation and engagement.
(A) Incorrect – Security.
Job security is a hygiene factor, meaning its absence causes dissatisfaction, but its presence does not create job satisfaction.
(B) Incorrect – Status.
Status is a hygiene factor, not a motivator. It prevents dissatisfaction but does not enhance motivation significantly.
(C) Correct – Recognition.
Recognition is a motivator, meaning it actively increases job satisfaction and is frequently cited by happy employees.
(D) Incorrect – Relationship with coworkers.
Work relationships are hygiene factors. While poor relationships can lead to dissatisfaction, strong relationships alone do not create motivation.
IIA’s Global Internal Audit Standards – Human Resources and Organizational Behavior
Discusses motivation theories and their impact on employee performance.
Herzberg’s Two-Factor Theory of Motivation
Identifies recognition as a primary factor for employee satisfaction.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following controls would an internal auditor consider the most relevant to reduce risks of project cost overruns?
Scope change requests are reviewed and approved by a manager with a proper level of authority.
Cost overruns are reviewed and approved by a control committee led by the project manager.
There is a formal quality assurance process to review scope change requests before they are implemented
There is a formal process to monitor the status of the project and compare it to the cost baseline
Understanding Project Cost Overruns and Controls
Cost overruns occur when actual project costs exceed the budgeted or planned costs. Effective controls are required to prevent, detect, and correct deviations from the cost baseline.
The most effective way to control cost overruns is through continuous monitoring and comparison of project costs against the approved cost baseline.
Why Option D is Correct?
A formal process to monitor the project status and compare it to the cost baseline ensures that deviations are identified early and corrective actions are taken.
This aligns with the IIA's International Standards for the Professional Practice of Internal Auditing (IPPF), specifically:
Standard 2120 – Risk Management: Internal auditors must evaluate how organizations manage risks, including financial risks related to project cost overruns.
Standard 2500 – Monitoring Progress: Ensures that corrective actions are implemented when issues arise.
IIA Practice Advisory 2130-1: Stresses the importance of monitoring activities to mitigate financial risks.
The Project Management Body of Knowledge (PMBOK) also supports cost monitoring as a key control to prevent overruns.
Why Other Options Are Incorrect?
Option A: Reviewing and approving scope change requests is important, but it does not directly monitor or control cost overruns. Scope creep is a risk, but cost monitoring is a more direct control.
Option B: Having a control committee review overruns after they occur is a reactive measure. Proactive monitoring (option D) is more effective.
Option C: A quality assurance process for scope changes is valuable but does not directly prevent cost overruns. It focuses on project quality rather than financial control.
Effective internal controls for cost management emphasize real-time monitoring and comparison against the cost baseline to prevent and mitigate cost overruns.
IIA Standards 2120, 2500, and 2130-1 support proactive risk management and monitoring as essential best practices for internal auditors.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management
IPPF Standard 2500 – Monitoring Progress
IIA Practice Advisory 2130-1 – Internal Control and Risk Management
PMBOK – Cost Monitoring and Control
c
In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?
Input controls
Segregation of duties
Physical controls
Integrity controls
Understanding IT Infrastructure Risks and Workstation Security:
Reviewing an organization’s IT infrastructure risks includes assessing the security of workstations (desktops, laptops, and terminals) that connect to the organization's network.
Workstations are vulnerable to physical theft, unauthorized access, and malware attacks, making physical controls a critical security measure.
Why Physical Controls Are the Most Relevant for Workstations:
Physical controls prevent unauthorized physical access, theft, tampering, and damage to workstations.
Examples include:
Locked office spaces or workstation enclosures to restrict access.
Security badges or biometric authentication to prevent unauthorized use.
Cable locks for laptops and desktop computers to deter theft.
Surveillance cameras and security guards to monitor access.
Why Other Options Are Incorrect:
A. Input controls – Incorrect.
Input controls ensure accuracy and completeness of data entry, which applies more to application security, not workstation security.
B. Segregation of duties – Incorrect.
Segregation of duties prevents fraud and conflicts of interest, but it does not directly address workstation security risks.
D. Integrity controls – Incorrect.
Integrity controls ensure data consistency and accuracy in databases and transactions, not workstation security.
IIA’s Perspective on IT Risk and Physical Security Controls:
IIA Standard 2110 – Governance requires organizations to implement physical security measures for IT assets, including workstations.
IIA GTAG (Global Technology Audit Guide) on IT Risks highlights the importance of restricting physical access to IT devices to prevent unauthorized use or data breaches.
ISO 27001 Information Security Standard recommends physical controls to secure IT infrastructure and prevent workstation-related risks.
IIA References:
IIA Standard 2110 – IT Security & Physical Access Control
IIA GTAG – Physical Security of IT Assets
ISO 27001 – Physical Security and IT Risk Management
Thus, the correct and verified answer is C. Physical controls.
Employees at an events organization use a particular technique to solve problems and improve processes. The technique consists of five steps: define, measure, analyze,
improve, and control. Which of the following best describes this approach?
Six Sigma,
Quality circle.
Value chain analysis.
Theory of constraints.
The Define, Measure, Analyze, Improve, and Control (DMAIC) methodology is the core framework of Six Sigma, a data-driven process improvement approach that aims to reduce defects, enhance efficiency, and optimize performance.
(A) Correct – Six Sigma.
DMAIC is a structured Six Sigma methodology used for problem-solving and process improvement.
It helps organizations identify inefficiencies, eliminate errors, and standardize processes.
(B) Incorrect – Quality circle.
A quality circle is a group of employees who meet to discuss and resolve work-related issues, but it does not follow the structured DMAIC approach.
(C) Incorrect – Value chain analysis.
Value chain analysis focuses on evaluating business activities to improve competitive advantage, not structured process improvement like Six Sigma.
(D) Incorrect – Theory of constraints.
The Theory of Constraints (TOC) focuses on identifying and eliminating bottlenecks in processes, but it does not use the DMAIC approach.
IIA’s Global Internal Audit Standards – Process Improvement and Risk Management
Emphasizes methodologies like Six Sigma for operational efficiency.
COSO’s ERM Framework – Continuous Improvement and Quality Management
Discusses the role of Six Sigma in improving processes and reducing risks.
IIA’s Guide on Business Process Auditing
Recommends structured approaches such as Six Sigma for evaluating process efficiency.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?
Deploys data visualization tool.
Adopt standardized data analysis software.
Define analytics objectives and establish outcomes.
Eliminate duplicate records.
Data cleaning (also called data cleansing or scrubbing) is a critical step in data analytics to ensure accuracy, consistency, and reliability. Removing duplicate records is a key data cleaning technique that improves data quality.
Improves Data Integrity – Prevents misleading results caused by duplicate values.
Enhances Data Accuracy – Ensures that analytics are based on unique and valid information.
Optimizes Performance – Reduces redundancy, improving processing speed and efficiency.
Prevents Reporting Errors – Ensures accurate insights for decision-making.
A. Deploys data visualization tool – Visualization tools help interpret data but do not clean it.
B. Adopt standardized data analysis software – Software tools support analysis but do not eliminate duplicate records automatically.
C. Define analytics objectives and establish outcomes – This step is important for analysis strategy, but it does not clean data.
IIA’s GTAG on Data Analytics – Emphasizes the importance of data cleansing in ensuring reliable analytics.
COBIT 2019 (Data Management Framework) – Highlights duplicate removal as a best practice in data governance.
ISO 8000-110 (Data Quality Standard) – Recommends eliminating duplicate records for high-quality analytics.
Why Eliminating Duplicate Records is the Correct Answer?Why Not the Other Options?IIA References:✅ Final Answer: D. Eliminate duplicate records.
An internal auditor discusses user-defined default passwords with the database administrator. Such passwords will be reset as soon as the user logs in for the first time, but the initial value of the password is set as "123456." Which of the following are the auditor and the database administrator most likely discussing in this situation?
Whether it would be more secure to replace numeric values with characters.
What happens in the situations where users continue using the initial password.
What happens in the period between the creation of the account and the password change.
Whether users should be trained on password management features and requirements.
The discussion between the internal auditor and the database administrator is most likely centered around the security risk present in the period between account creation and password change. When a system generates a default password such as "123456," it introduces a temporary vulnerability until the user changes it.
Understanding Default Password Security Risks:
Default passwords, especially predictable ones (e.g., "123456"), pose a security threat because they are easy to guess.
If an unauthorized user gains access before the legitimate user changes the password, data confidentiality and integrity may be compromised (IIA GTAG - Global Technology Audit Guide).
Evaluating the Window of Exposure:
The primary concern is the time between account creation and password reset.
During this time, an attacker could exploit the default password to gain unauthorized access to sensitive systems.
Why Other Options Are Less Relevant:
Option A (Replacing numbers with characters) – While this improves security, it does not directly address the risk of an attacker exploiting the default password before the user resets it.
Option B (Users continuing to use the initial password) – This is a security issue, but it is mitigated by requiring a password reset upon first login. The primary concern is the time before the reset happens.
Option D (User training on password management) – While training is crucial for long-term security, it does not directly address the immediate vulnerability of default passwords before they are changed.
IIA Global Technology Audit Guide (GTAG) 16: Data Management and Security
IIA Standard 2110 – Governance: Recommends addressing IT security risks, including credential management.
IIA Practice Advisory 2130.A1-1: Internal auditors should assess whether management has identified, assessed, and mitigated IT security risks, such as weak authentication practices.
Step-by-Step Analysis:Relevant IIA References:
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?
A value-added network.
A local area network.
A metropolitan area network.
A wide area network.
A Value-Added Network (VAN) is a private, third-party managed network that provides secure electronic data interchange (EDI) and other communication services between business partners. VANs offer enhanced security, reliability, and efficiency in transmitting business-critical data, making them ideal for companies engaged in manufacturing and distribution that require secure and structured communication channels with trading partners.
Secure Network for Business Partners: The scenario describes a network that facilitates EDI between a company and its trading partners. A VAN specializes in providing secure and structured business communications.
Enhanced Efficiency and Customer Service: VANs streamline business operations by reducing transaction errors, improving order fulfillment, and increasing operational efficiencies.
Third-Party Management: Unlike traditional internal networks, VANs are managed by external service providers that offer additional security, compliance, and encryption measures.
Alignment with Internal Auditing Standards: The IIA emphasizes the importance of secure and reliable communication networks in governance, risk management, and internal controls. Secure data exchanges through a VAN mitigate risks associated with unauthorized access and data breaches.
B. A Local Area Network (LAN): LANs are confined to a limited geographical area, such as an office or a factory, and are used for internal communication rather than secure external partner communication.
C. A Metropolitan Area Network (MAN): MANs connect multiple LANs within a city or a metropolitan region but are not specifically designed for business-to-business data exchange.
D. A Wide Area Network (WAN): While WANs connect geographically dispersed networks, they do not inherently provide the secure, structured EDI services that a VAN does.
IIA Standard 2110 - Governance: Emphasizes the importance of IT governance and secure communication channels in protecting business data.
IIA Standard 2120 - Risk Management: Highlights the need for secure data transmission to mitigate cyber risks.
IIA Standard 2201 - Planning the Engagement: Requires auditors to assess IT infrastructure, including networks used for business operations.
COBIT Framework (Control Objectives for Information and Related Technologies): Supports the use of secure, managed networks like VANs for business data exchange.
Key Reasons Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. A Value-Added Network (VAN).
Which of the following functions of a quality assurance and improvement program (QAIP) must be performed by personnel independent of the internal audit function?
External assessments
Communication of QAIP results to the board
Disclosure of nonconformance
Internal assessments
A QAIP includes both internal and external assessments. While internal assessments can be performed by audit staff or within the activity, external assessments must be conducted by a qualified, independent party outside of the internal audit activity.
Options B and C are the CAE’s responsibilities. Option D (internal assessments) is not independent and is part of routine quality control.
Which of the following is the most appropriate beginning step of a work program for an assurance engagement involving smart devices?
Train all employees on bring-your-own-device (BYOD) policies.
Understand what procedures are in place for locking lost devices
Obtain a list of all smart devices in use
Test encryption of all smart devices
In an assurance engagement involving smart devices, the first step is to obtain a comprehensive inventory of all devices in use. This ensures that the audit covers all relevant assets and allows the internal auditor to assess risks, controls, and policies effectively.
(A) Incorrect – Train all employees on bring-your-own-device (BYOD) policies.
While employee training is important, it is a control measure rather than the first step in an assurance engagement.
Without an inventory of devices, training effectiveness cannot be assessed.
(B) Incorrect – Understand what procedures are in place for locking lost devices.
This is a specific control measure but not the starting point for an engagement.
The first step should be to identify what devices exist before evaluating security measures.
(C) Correct – Obtain a list of all smart devices in use.
The foundation of an assurance engagement is identifying the scope, which includes listing all smart devices in use.
This allows the auditor to evaluate security risks, compliance, and control measures effectively.
(D) Incorrect – Test encryption of all smart devices.
Testing encryption is an audit procedure that should be performed after understanding the inventory and existing controls.
Without knowing which devices exist, encryption testing would not be effective.
IIA’s Global Internal Audit Standards – Technology Assurance and Cybersecurity Audits
Outlines steps for conducting technology-related assurance engagements.
IIA’s GTAG (Global Technology Audit Guide) on Auditing Smart Devices
Recommends obtaining an inventory of devices as the first step in an audit.
COBIT Framework – IT Asset Management and Control
Emphasizes identifying assets as the foundation of IT governance and risk management.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following best describes a man-in-the-middle cyber-attack?
The perpetrator is able to delete data on the network without physical access to the device.
The perpetrator is able to exploit network activities for unapproved purposes.
The perpetrator is able to take over control of data communication in transit and replace traffic.
The perpetrator is able to disable default security controls and introduce additional vulnerabilities
Understanding a Man-in-the-Middle (MITM) Attack:
A Man-in-the-Middle (MITM) attack occurs when a cybercriminal intercepts, alters, or steals data while it is being transmitted between two parties.
The attacker can modify messages, inject malicious content, or eavesdrop on sensitive communications without the knowledge of the sender or receiver.
How MITM Attacks Work:
Attackers position themselves between two communicating parties (e.g., a user and a banking website) and intercept the data exchange.
This allows them to steal login credentials, financial information, or confidential communications.
Common MITM attack methods include:
Wi-Fi eavesdropping (public network interception).
Session hijacking (stealing active user sessions).
HTTPS spoofing (tricking users into thinking they are on a secure website).
Why Other Options Are Incorrect:
A. The perpetrator is able to delete data on the network without physical access to the device – Incorrect.
This describes a remote cyberattack, such as malware or ransomware, rather than MITM, which focuses on data interception.
B. The perpetrator is able to exploit network activities for unapproved purposes – Incorrect.
This is too broad and could refer to insider threats, malware, or privilege escalation attacks, rather than specifically MITM.
D. The perpetrator is able to disable default security controls and introduce additional vulnerabilities – Incorrect.
This describes a system exploitation attack, such as a rootkit or backdoor installation, not an MITM attack.
IIA’s Perspective on Cybersecurity and IT Risk Management:
IIA Standard 2110 – Governance requires organizations to implement cybersecurity controls to mitigate risks like MITM attacks.
IIA GTAG (Global Technology Audit Guide) on Cybersecurity Risks advises organizations to use encryption (e.g., TLS, VPNs) to protect data in transit.
NIST Cybersecurity Framework recommends multi-factor authentication (MFA) and secure protocols to prevent MITM attacks.
IIA References:
IIA Standard 2110 – IT Security and Cyber Risk Governance
IIA GTAG – Cybersecurity Controls and Threat Mitigation
NIST Cybersecurity Framework – Secure Data Transmission
Thus, the correct and verified answer is C. The perpetrator is able to take over control of data communication in transit and replace traffic.
A one-time password would most likely be generated in which of the following situations?
When an employee accesses an online digital certificate
When an employee's biometrics have been accepted.
When an employee creates a unique digital signature,
When an employee uses a key fob to produce a token.
A one-time password (OTP) is a unique, temporary password that is valid for a single login session or transaction. It is commonly used in multi-factor authentication (MFA) systems to enhance security.
Correct Answer (D - When an Employee Uses a Key Fob to Produce a Token)
Key fobs generate a time-sensitive one-time password (OTP), which is used in conjunction with a traditional password to enhance security.
These devices are part of two-factor authentication (2FA) or multi-factor authentication (MFA) methods.
The IIA GTAG 9: Identity and Access Management discusses OTP tokens as a strong security control to prevent unauthorized access.
Why Other Options Are Incorrect:
Option A (When an employee accesses an online digital certificate):
Digital certificates authenticate users or devices, but they do not generate one-time passwords.
Option B (When an employee's biometrics have been accepted):
Biometric authentication (e.g., fingerprint, facial recognition) grants access based on biological traits, not an OTP.
Option C (When an employee creates a unique digital signature):
Digital signatures authenticate documents and transactions, but they are not time-sensitive one-time passwords.
IIA GTAG 9: Identity and Access Management – Covers OTP tokens as a security measure.
IIA Practice Guide: Auditing IT Security Controls – Recommends OTPs as part of secure authentication.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because key fobs generate one-time passwords for secure authentication.
Which of the following characteristics applies to an organization that adopts a flat structure?
The structure is dispersed geographically
The hierarchy levels are more numerous.
The span of control is wide
The tower-level managers are encouraged to exercise creativity when solving problems
A flat organizational structure is characterized by fewer hierarchical levels and wider spans of control, meaning that managers oversee a larger number of employees directly.
Definition of a Flat Structure:
A flat structure reduces middle management layers, promoting direct communication between top executives and employees.
According to IIA’s Organizational Governance Guidelines, organizations with a flat structure empower employees and reduce bureaucratic delays.
Key Characteristics of a Flat Structure:
Wide Span of Control: Managers oversee more employees due to fewer hierarchical levels.
Faster Decision-Making: Less bureaucracy allows for quicker responses.
Greater Employee Autonomy: Employees have more decision-making responsibilities.
Why Not Other Options?
A. The structure is dispersed geographically:
A geographically dispersed organization is not necessarily flat; it could be hierarchical or matrix-based.
B. The hierarchy levels are more numerous:
Flat structures have fewer levels, while tall structures have numerous levels.
D. The lower-level managers are encouraged to exercise creativity when solving problems:
While creativity may be encouraged, this is not a defining feature of a flat structure.
IIA Practice Guide: Organizational Governance
IIA Standard 2110 – Governance
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is C. The span of control is wide.
Which of the following would be the strongest control to prevent unauthorized wireless network access?
Allowing access to the organization's network only through a virtual private network.
Logging devices that access the network, including the date. time, and identity of the user.
Tracking all mobile device physical locations and banning access from non-designated areas.
Permitting only authorized IT personnel to have administrative control of mobile devices.
To prevent unauthorized wireless network access, the strongest control is to require access through a Virtual Private Network (VPN). A VPN encrypts data and ensures that only authorized users with proper credentials can connect securely.
Encryption & Secure Communication: VPNs use strong encryption protocols (e.g., AES-256) to protect data from unauthorized access.
Restricted Access Control: Users must authenticate through a secure VPN gateway, reducing the risk of unauthorized access.
Compliance with IT Security Standards: VPNs are recommended by security frameworks such as NIST 800-53, ISO 27001, and CIS Critical Security Controls.
Option B (Logging devices that access the network, including date, time, and user identity): Logging is important for monitoring but does not prevent unauthorized access—it only records it after the fact.
Option C (Tracking all mobile device physical locations and banning access from non-designated areas): Geofencing can help restrict access but is not as secure as a VPN, and attackers could spoof locations.
Option D (Permitting only authorized IT personnel to have administrative control of mobile devices): While restricting administrative control is good practice, it does not prevent unauthorized users from connecting to the network.
IIA’s GTAG on IT Security & Cybersecurity Risks highlights VPNs as a critical security measure to prevent unauthorized access.
ISO 27001 (Annex A.13) – Network Security Management recommends encrypting data transmissions to secure wireless network access.
NIST 800-53 (SC-12, SC-13, SC-28) emphasizes using VPNs for secure remote and wireless network access.
Why Option A is Correct (VPN):Why Other Options Are Incorrect:IIA References:Thus, the most appropriate answer is A. Allowing access to the organization's network only through a virtual private network (VPN).
To achieve conformance with the Global Internal Audit Standards, the chief audit executive must include which of the following activities in the quality assurance and improvement program (QAIP)?
Require board oversight of the QAIP
Assess Standards conformance for each individual assurance engagement
Conduct a self-assessment at least once every five years
Report the results of the QAIP to the board
The CAE must communicate the results of the QAIP to the board and senior management. This includes results from ongoing monitoring, periodic self-assessments, and external assessments.
Option A (board oversight) is part of governance but not a QAIP requirement. Option B is incorrect because conformance is assessed for the activity overall, not per engagement. Option C is incorrect because self-assessments are ongoing, while external assessments are required at least once every five years.
Thus, the essential QAIP requirement for conformance is reporting results to the board (Option D).
Which of the following scenarios would cause a chief audit executive (CAE) to immediately discontinue using any statements that would indicate conformance with the Global Internal Audit Standards in an audit report?
The internal audit function used a risk-based approach to create the internal audit plan
The engagement supervisor considered requests from senior management regarding engagements to include in the internal audit plan
The CAE only accepted engagements that the internal audit function collectively had the knowledge to perform
The activity under review restricted the internal audit function's ability to access records, impacting the audit results
The Global Internal Audit Standards require unrestricted access to records, personnel, and information. If access is restricted in such a way that audit results are compromised, the CAE cannot claim conformance with the Standards in any report until the issue is resolved.
Options A, B, and C are all in alignment with the Standards and do not affect conformance. Only restriction of access (Option D) requires immediate discontinuation of conformance claims.
The budgeted cost of work performed is a metric best used to measure which project management activity?
Resource planning.
Cost estimating
Cost budgeting.
Cost control.
ï‚· Understanding the Metric:
The Budgeted Cost of Work Performed (BCWP), also known as Earned Value (EV), represents the value of work actually performed up to a specific date, based on the budgeted cost.
This metric is part of Earned Value Management (EVM) and is used to track project performance by comparing planned and actual progress.
ï‚· Why Cost Control?
Cost control involves monitoring expenses, comparing actual performance with the budget, and taking corrective actions when needed.
BCWP is a core metric in cost control as it helps in determining whether a project is staying within budget.
ï‚· Why Other Options Are Incorrect:
A. Resource planning: Focuses on allocating personnel, equipment, and materials but does not deal with financial performance.
B. Cost estimating: Involves predicting project costs before execution, but BCWP is used during the project, not during estimation.
C. Cost budgeting: Refers to setting a budget, whereas BCWP measures how much work has been performed relative to that budget.
ï‚· IIA Standards and References:
IIA Standard 2120 – Risk Management: Internal auditors should assess cost control mechanisms to manage financial risks.
IIA Practice Guide: Auditing Capital Projects (2016): Emphasizes earned value management as a key cost control measure.
PMBOK Guide – Cost Management Knowledge Area: Highlights BCWP as a crucial tool for monitoring and controlling project costs.
Which of the following statements. Is most accurate concerning the management and audit of a web server?
The file transfer protocol (FTP) should always be enabled.
The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.
The number of ports and protocols allowed to access the web server should be maximized.
Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.
Importance of Secure Protocols for Web Server Management:
Web servers handle sensitive data, including user credentials, financial information, and confidential communications.
Using secure protocols like HTTPS, SFTP, and TLS-encrypted SMTP ensures data is encrypted and protected from cyber threats.
Risks of Clear-Text Protocols (HTTP & FTP):
HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) transmit data in plaintext, making them vulnerable to man-in-the-middle (MITM) attacks, packet sniffing, and unauthorized access.
SFTP (Secure File Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) encrypt data, mitigating these risks.
Why Other Options Are Incorrect:
A. The file transfer protocol (FTP) should always be enabled – Incorrect.
FTP is not secure, and enabling it can expose the server to unauthorized file access and cyberattacks.
B. The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts – Incorrect.
SMTP should operate with minimal privileges to reduce security risks in case of a breach.
C. The number of ports and protocols allowed to access the web server should be maximized – Incorrect.
Minimizing open ports and protocols reduces the attack surface and limits unauthorized access.
IIA’s Perspective on IT Security and Web Server Management:
IIA Standard 2110 – Governance requires organizations to establish secure IT practices, including encryption and secure protocols.
IIA GTAG (Global Technology Audit Guide) on IT Risks emphasizes minimizing security vulnerabilities by using encrypted communication.
ISO 27001 Security Standard recommends secure transmission protocols for protecting sensitive data.
IIA References:
IIA Standard 2110 – IT Security and Governance
IIA GTAG – IT Risks and Secure Web Server Management
ISO 27001 Security Standard – Data Encryption and Secure Transmission
Thus, the correct and verified answer is D. Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP.
When auditing databases, which of the following risks would an Internal auditor keep In mind In relation to database administrators?
The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes.
The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion.
The risk that database administrators set up personalized accounts for themselves, making the audit time consuming.
The risk that database administrators could make hidden changes using privileged access.
Database administrators (DBAs) have privileged access, meaning they can make unauthorized or hidden changes to data, database structures, and security settings without detection. This presents a high risk of fraud, data manipulation, and security breaches.
A. The risk that database administrators will disagree with temporarily preventing user access to the database for auditing purposes. (Incorrect)
While resistance from DBAs during an audit can be a challenge, it is not a significant risk compared to the ability to manipulate data unnoticed.
B. The risk that database administrators do not receive new patches from vendors that support database software in a timely fashion. (Incorrect)
Patch management is a security concern but does not directly relate to the unique risk of DBAs abusing privileged access.
C. The risk that database administrators set up personalized accounts for themselves, making the audit time-consuming. (Incorrect)
While personal accounts can complicate audits, the greater risk is that DBAs can make changes without detection.
IIA GTAG 4 – Management of IT Auditing emphasizes the need for controls over privileged access to prevent unauthorized database modifications.
IIA Standard 2110 – Governance requires internal auditors to assess risks related to IT governance and privileged access management.
IIA GTAG 8 – Auditing Application Controls highlights that auditors must review DBA activity logs and ensure segregation of duties.
Explanation of Answer Choices:IIA References:Thus, the correct answer is D. The risk that database administrators could make hidden changes using privileged access.
A manufacturer ss deciding whether to sell or process materials further. Which of the following costs would be relevant to this decision?
Incremental processing costs, incremental revenue, and variable manufacturing expenses.
Joint costs, incremental processing costs, and variable manufacturing expenses.
Incremental revenue, joint costs, and incremental processing costs.
Variable manufacturing expenses, incremental revenue, and joint costs
When deciding whether to sell a product as-is or process it further, a manufacturer should consider only relevant costs—those that will change based on the decision.
Why Option A (Incremental processing costs, incremental revenue, and variable manufacturing expenses) is Correct:
Incremental processing costs: These are additional costs required to process the material further, making them directly relevant.
Incremental revenue: The additional revenue that would be generated if the product is processed further is a key factor in decision-making.
Variable manufacturing expenses: These costs change with production levels, making them important in the decision-making process.
Why Other Options Are Incorrect:
Option B (Joint costs, incremental processing costs, and variable manufacturing expenses):
Incorrect because joint costs (costs incurred before the split-off point) are sunk costs and are not relevant in the decision.
Option C (Incremental revenue, joint costs, and incremental processing costs):
Incorrect because, again, joint costs are not relevant to the decision.
Option D (Variable manufacturing expenses, incremental revenue, and joint costs):
Incorrect because joint costs should be ignored in a sell-or-process-further decision.
IIA GTAG – "Auditing Cost Accounting Decisions": Discusses relevant costs in decision-making.
IFRS & GAAP Cost Accounting Standards: Explain cost classification and decision-making.
COSO Internal Control – Integrated Framework: Recommends proper cost allocation methods for financial decisions.
IIA References:
An internal audit function did not conform with the Global Internal Audit Standards in only one of many engagements, as the engagement was performed with a lack of adequate knowledge of the subject matter. Which of the following is appropriate in relation to declaring conformance with the Standards?
The internal audit function can still declare conformance with the Standards for all engagements
The internal audit function can still declare conformance with the Standards for all other engagements that satisfy the requirements
The internal audit function can declare partial conformance with the Standards for all engagements
The internal audit function needs to evaluate the impact of the nonconformance before it can declare nonconformance with the Standards
According to IIA guidance, if a nonconformance occurs, the CAE must evaluate its impact on the overall scope and operations of the internal audit activity. If the deficiency materially affects internal audit’s overall ability to fulfill its responsibilities, conformance cannot be claimed. If the impact is limited, conformance may still be declared with appropriate disclosure.
Options A and B assume automatic conformance without evaluation. Option C is incorrect because there is no concept of “partial conformance†under the Standards.
Which of the following differentiates a physical access control from a logical access control?
Physical access controls secure tangible IT resources, whereas logical access controls secure software and data internal to the IT system.
Physical access controls secure software and data internal to the IT system, whereas logical access controls secure tangible IT resources.
Physical access controls include firewalls, user IDs, and passwords, whereas logical access controls include locks and security guards.
Physical access controls include input processing and output controls, whereas logical access controls include locked doors and security guards.
Comprehensive and Detailed In-Depth Explanation:
Physical access controls are security measures designed to prevent unauthorized physical access to tangible IT resources, such as computer hardware, servers, and networking equipment. Examples include locks, security guards, and biometric access systems. In contrast, logical access controls protect access to software and data within the IT system, ensuring that only authorized users can interact with digital resources. These controls include mechanisms like user IDs, passwords, firewalls, and encryption. Option A accurately captures this distinction, whereas the other options either reverse the definitions or misclassify examples of physical and logical controls.
An organization is considering integration of governance, risk., and compliance (GRC) activities into a centralized technology-based resource. In implementing this GRC
resource, which of the following is a key enterprise governance concern that should be fulfilled by the final product?
The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided.
Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
When an organization integrates governance, risk, and compliance (GRC) activities into a centralized technology-based resource, enterprise governance must ensure that the system:
Supports strategic decision-making by the board and senior management.
Provides accurate, reliable, and quality information to demonstrate an effective governance framework.
Aligns with IIA Standard 2110 – Governance, which requires auditors to assess whether the organization’s governance structure supports accountability, transparency, and effective decision-making.
(A) The board should be fully satisfied that there is an effective system of governance in place through accurate, quality information provided. (Correct Answer)
Governance is about ensuring that stakeholders, particularly the board, have confidence in the organization's control environment and decision-making process.
IIA Standard 2110 (Governance) states that internal auditors must evaluate the adequacy and effectiveness of governance structures.
A GRC system should ensure transparency, accountability, and quality reporting to enable strategic governance oversight.
(B) Compliance, audit, and risk management can find and seek efficiencies between their functions through integrated information reporting.
While improving efficiency is a benefit of a GRC system, it is a secondary objective, not a primary enterprise governance concern.
(C) Key compliance and risk metrics can be tracked and compared throughout the enterprise, aiding in identifying problem departments.
Tracking risk metrics is useful but does not directly address governance at the board level, making this answer incomplete.
(D) Data analytics can be utilized for trending of the data to ensure that patterns and ongoing monitoring occurs throughout the organization.
Analytics support monitoring, but the core governance concern is ensuring the board’s confidence in the system.
IIA Standard 2110 – Governance: Internal auditors must assess whether governance processes are effective.
GTAG 1 – Information Technology Risks and Controls: IT governance must provide quality, reliable information for decision-making.
COSO ERM Framework: Emphasizes governance as a key driver of enterprise risk management.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (A) because effective enterprise governance relies on accurate and high-quality information for strategic decision-making.
Which of the following statements about assurance maps is true?
They help identify gaps and duplications in an organization’s assurance coverage
They allow the board to coordinate activities of internal and external assurance providers
They help identify which assurance provider is responsible for performing each audit listed in the annual internal audit plan
They allow internal auditors to map competencies and specialty areas of the assurance providers in an organization
An assurance map provides an overview of assurance activities across the organization and helps identify gaps (uncovered risks) and duplications (overlap of work). This enhances coordination among assurance providers and supports the board’s governance oversight.
Option B is incorrect because the board does not coordinate activities; internal audit facilitates assurance mapping. Option C misinterprets the tool—it does not assign specific audits. Option D refers to staff competencies, not assurance coverage.
Focus An organization has decided to have all employees work from home. Which of the following network types would securely enable this approach?
A wireless local area network (WLAN ).
A personal area network (PAN).
A wide area network (WAN).
A virtual private network (VPN)
When employees work from home, secure remote access to the organization's network is essential to protect data and ensure confidentiality. A Virtual Private Network (VPN) is the best option for enabling this securely.
Correct Answer (D - A Virtual Private Network (VPN))
A VPN creates a secure, encrypted connection between the employee's device and the organization’s internal network.
It prevents unauthorized access by ensuring that data is transmitted securely over the internet.
The IIA GTAG 17: Auditing Network Security recommends VPNs for secure remote work environments to prevent cyber threats.
Why Other Options Are Incorrect:
Option A (A Wireless Local Area Network - WLAN):
A WLAN is used within an office or home environment, but it does not provide secure remote access to an organization's network.
Option B (A Personal Area Network - PAN):
A PAN connects devices like smartphones and laptops within a short range (e.g., Bluetooth), but it is not suitable for secure remote access.
Option C (A Wide Area Network - WAN):
A WAN connects multiple locations, but it does not provide encryption or remote security like a VPN.
IIA GTAG 17: Auditing Network Security – Recommends VPNs for secure remote access.
IIA Practice Guide: Auditing IT Security Controls – Covers VPNs as a key security control for remote work.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because a VPN ensures secure, encrypted communication for employees working from home.
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Direct product costs
Indirect costs
Direct period costs
Indirect period costs
Which of the following statements is true regarding cost-volume-profit analysis?
Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted
Breakeven is the amount of units sold to cover variable costs
Breakeven occurs when the contribution margin covers fixed costs
Following breakeven, net operating income will increase by the excess of fixed costs less the variable costs per unit sold
Which of the following statements is true regarding user-developed applications (UDAs)?
UDAs are less flexible and more difficult to configure than traditional IT applications.
Updating UDAs may lead to various errors resulting from changes or corrections.
UDAs typically are subjected to application development and change management controls.
Using UDAs typically enhances the organization's ability to comply with regulatory factors.
User-Developed Applications (UDAs) are applications, spreadsheets, databases, or tools created and maintained by end-users rather than IT departments. They provide flexibility but also introduce risks related to security, accuracy, and change management.
Why Option B is Correct:
UDAs lack formal change management controls.
Since they are typically not subject to rigorous testing and documentation, modifications may introduce errors.
Updating or correcting a formula, macro, or script in a UDA may have unintended consequences that go unnoticed, leading to data integrity issues.
Why Other Options Are Incorrect:
Option A (UDAs are less flexible and more difficult to configure than traditional IT applications):
Incorrect. UDAs are more flexible and easier to modify compared to traditional IT applications, which undergo strict change controls.
Option C (UDAs typically are subjected to application development and change management controls):
Incorrect. Most UDAs lack formal governance or IT oversight. They are typically developed by business users with little or no structured IT controls.
Option D (Using UDAs typically enhances the organization’s ability to comply with regulatory factors):
Incorrect. UDAs introduce compliance risks due to lack of security, audit trails, and formal change controls.
IIA GTAG – "Auditing User-Developed Applications": Discusses risks and controls related to UDAs.
IIA Practice Advisory 2130-1 (Control Risk Self-Assessment): Highlights the importance of internal controls over UDAs.
COSO Internal Control – Integrated Framework: Recommends applying IT general controls (ITGCs) to UDAs.
IIA References:Thus, the correct answer is B. Updating UDAs may lead to various errors resulting from changes or corrections.
According to IIA guidance, whose input must be considered when developing the annual internal audit plan?
Operational management
External auditors
The CEO
Internal assurance providers
When developing the annual internal audit plan, the CAE must consider input from senior management, the board, and other internal assurance providers to ensure coordination and avoid duplication of efforts. While operational management, external auditors, and the CEO may also provide input, IIA Standards emphasize coordination with internal assurance providers as a mandatory step.
Which of the following security controls would provide the most efficient and effective authentication for customers to access these online shopping account?
12-digit password feature.
Security question feature.
Voice recognition feature.
Two-level sign-on feature
Two-level (or multi-factor) authentication (MFA) is the most efficient and effective security control for authenticating customers when accessing online shopping accounts. It provides an extra layer of security beyond just passwords, making it more difficult for unauthorized users to gain access.
Stronger Authentication – It requires two independent verification methods, such as:
Something you know (password, PIN)
Something you have (one-time code, mobile device, smart card)
Something you are (biometric feature)
Reduces Risk of Credential Theft – Even if hackers obtain a user's password, they still need the second factor to gain access.
Meets Regulatory Standards – Many cybersecurity frameworks (NIST, ISO 27001, PCI-DSS) recommend or mandate MFA for customer authentication.
Enhanced Customer Trust – Provides users with better security, reducing risks of fraud or account takeovers.
A. 12-digit password feature – Longer passwords improve security, but they can still be compromised through phishing or brute force attacks.
B. Security question feature – These are often weak because users choose predictable answers (e.g., mother's maiden name).
C. Voice recognition feature – Biometric authentication is useful, but voice recognition can be bypassed using deepfake or recorded audio.
IIA’s GTAG (Global Technology Audit Guide) on Information Security Management – Recommends multi-factor authentication for access control.
IIA’s International Professional Practices Framework (IPPF) – Standard 2110.A2 – Highlights the need for strong security controls to protect customer data.
NIST SP 800-63 (Digital Identity Guidelines) – Encourages multi-factor authentication as a best practice for securing user accounts.
Why Two-Level Sign-On (MFA) Is the Best Choice?Why Not the Other Options?IIA References:✅ Final Answer: D. Two-level sign-on feature (Most effective for online customer authentication).
===============
Which of the following is a result of implementing an e-commerce system that relies heavily on electronic data interchange (EDI) and electronic funds transfer (EFT) for purchasing and billing?
Higher cash flow and treasury balances.
Higher inventory balances.
Higher accounts receivable.
Higher accounts payable.
Comprehensive and Detailed In-Depth Explanation:
E-commerce systems that automate purchasing and billing typically lead to:
Faster procurement cycles due to automated ordering.
Increased accounts payable, as more transactions are processed quickly.
Option A (Higher cash flow) – Unlikely, since faster billing does not always improve cash flow.
Option B (Higher inventory balances) – Incorrect, as e-commerce often enables just-in-time inventory.
Option C (Higher accounts receivable) – E-commerce speeds up collections, reducing receivables.
Since automated purchasing increases outstanding payments, Option D is correct.
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
Collections from customers
Sale of securities.
Purchase of trucks.
Payment of debt, including interest
Understanding the Financing Section of a Cash Budget:
A cash budget is a financial plan that outlines expected cash inflows and outflows over a specific period.
The financing section records activities related to borrowing, repaying debt, issuing securities, and managing interest payments.
Why Debt and Interest Payments Belong in the Financing Section:
Debt repayment (principal and interest) is a financial activity rather than an operational or investing activity.
Companies must plan for financing costs to ensure liquidity and compliance with loan agreements.
Why Other Options Are Incorrect:
A. Collections from customers – Incorrect.
Customer payments belong in the operating section of the cash budget, as they represent core business activities.
B. Sale of securities – Incorrect.
The sale of securities is an investing activity unless related to issuing new debt or equity.
C. Purchase of trucks – Incorrect.
Buying trucks is a capital expenditure, which belongs in the investing section of the cash budget.
IIA’s Perspective on Financial Planning and Budgeting:
IIA Standard 2120 – Risk Management requires organizations to assess financial risks, including debt repayment obligations.
COSO ERM Framework highlights the importance of cash flow forecasting to maintain financial stability.
GAAP and IFRS Financial Reporting Standards classify debt repayment and interest under financing activities.
IIA References:
IIA Standard 2120 – Risk Management & Cash Flow Oversight
COSO ERM – Financial Planning and Liquidity Management
GAAP & IFRS – Cash Flow Statement Classifications
Thus, the correct and verified answer is D. Payment of debt, including interest.
Which of the following best describes the type of control provided by a firewall?
Corrective
Detective
Preventive
Discretionary
A firewall is a security control mechanism designed to prevent unauthorized access to or from a private network. It monitors and filters incoming and outgoing network traffic based on predefined security rules.
Definition of Control Types:
Preventive Control: Stops an undesirable event from occurring.
Detective Control: Identifies and records events after they have happened.
Corrective Control: Takes action to correct an issue after it has been detected.
Discretionary Control: Provides access control based on user discretion.
Why a Firewall is a Preventive Control:
Firewalls block unauthorized access to protect networks before a security breach can occur.
They enforce security policies in real-time, preventing cyber threats such as malware, intrusions, and unauthorized data access.
As per IIA GTAG (Global Technology Audit Guide) on Information Security, firewalls are categorized as preventive controls because they proactively mitigate threats before they materialize.
Why Not Other Options?
A. Corrective: Firewalls do not correct security breaches; they prevent them.
B. Detective: Firewalls do not just detect threats but actively block them.
D. Discretionary: Firewalls operate based on preset security rules rather than user discretion.
IIA GTAG – Information Security
IIA Standard 2110 – IT Governance & Risk Management
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is C. Preventive.
The head of the research and development department at a manufacturing organization believes that his team lacks expertise in some areas and decides to hire more experienced researchers to assist in the development of a new product. Which of the following variances are likely to occur as the result of this decision?
Favorable labor efficiency variance
Adverse labor rate variance
Adverse labor efficiency variance
Favorable labor rate variance
1 and 2.
1 and 4.
3 and 4.
2 and 3.
Comprehensive and Detailed In-Depth Explanation:
A favorable labor efficiency variance (Option 1) occurs because experienced workers complete tasks more efficiently, reducing time and waste.
An adverse labor rate variance (Option 2) arises because hiring experienced employees increases labor costs compared to budgeted rates.
Option 3 (Adverse labor efficiency variance) is incorrect because skilled workers typically improve efficiency.
Option 4 (Favorable labor rate variance) is incorrect because higher wages increase costs, leading to an adverse variance.
Thus, the correct answer is A (1 and 2 only).
Which of the following statements is true regarding multi-report summaries for members of senior management and the board?
Multi-report summaries should be used to describe the work performed by the internal audit function
In developing multi-report summaries, internal auditors should use multi-row and multi-column tables
Multi-report summaries are not useful to boards that see every engagement report
Multi-report summaries are readily developed if each finding is rated
Multi-report summaries are designed to provide senior management and the board with aggregated results across multiple audit engagements. To make them effective, internal audit functions typically rate findings (e.g., high, medium, low) so results can be compared and summarized efficiently.
Option A is incomplete because summaries are not just about describing audit work but about presenting meaningful insights. Option B (tables) refers to presentation style, not the key principle. Option C is incorrect because even if boards review individual reports, summaries provide strategic insights across engagements.
Thus, the correct answer is Option D.
Which of the following is the most appropriate way to record each partner’s initial investment in a partnership?
At the value agreed upon by the partners
At book value
At fair value
At the original cost
A company produces water buckets with the following costs per bucket:
Direct labor = 82
Direct material = $5
Fixed manufacturing = 83.50
Variable manufacturing = 82.50
The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.
Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?
$9.50
$10.50
$11
$13
When evaluating a special order, only relevant costs should be considered. Fixed costs are not relevant because they remain unchanged regardless of production levels. The relevant costs include variable manufacturing costs and direct costs (direct labor and direct material).
Step-by-Step Calculation of Relevant Cost per Unit:Given cost per bucket:
Direct Labor = $2
Direct Material = $5
Variable Manufacturing Cost = $2.50
Fixed Manufacturing Cost = $3.50 (Not relevant)
Relevant Cost Per Unit:Direct Labor+Direct Material+Variable Manufacturing Cost\text{Direct Labor} + \text{Direct Material} + \text{Variable Manufacturing Cost}Direct Labor+Direct Material+Variable Manufacturing Cost =2+5+2.50=9.50= 2 + 5 + 2.50 = 9.50=2+5+2.50=9.50
Since fixed costs remain constant, they do not impact the decision to accept the order. The relevant cost is $9.50 per unit.
B. $10.50 – Includes some portion of fixed costs, which should be excluded.
C. $11 – Incorrect because it overestimates costs by considering fixed expenses.
D. $13 – Includes both fixed and variable costs, but only variable costs matter for decision-making.
IIA’s GTAG on Cost Analysis and Decision-Making – Emphasizes using relevant costs for pricing decisions.
COBIT 2019 (Governance and Decision-Making Framework) – Recommends marginal cost analysis for special orders.
Managerial Accounting Principles – States that fixed costs should not influence short-term pricing decisions.
Why Not the Other Options?IIA References:
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Veracity, velocity, and variety.
Integrity, availability, and confidentiality.
Accessibility, accuracy, and effectiveness.
Authorization, logical access, and physical access.
Cybersecurity controls are primarily designed to protect the Confidentiality, Integrity, and Availability (CIA) of data. These are the three fundamental principles of cybersecurity and are essential for protecting organizational information assets. Let’s analyze each option:
Option A: Veracity, velocity, and variety.
Incorrect. These attributes are commonly associated with big data and data analytics rather than cybersecurity. Cybersecurity controls focus on ensuring that data is secure, rather than on its volume, speed, or diversity.
IIA Reference: Cybersecurity risk management frameworks emphasize the CIA triad over big data attributes. (IIA GTAG: Auditing Cybersecurity Risk)
Option B: Integrity, availability, and confidentiality.
Correct. These three principles are at the core of cybersecurity:
Confidentiality: Ensures that sensitive information is only accessible to authorized individuals.
Integrity: Protects data from unauthorized modifications or corruption.
Availability: Ensures that data and systems are accessible when needed.
IIA Reference: The IIA’s guidance on IT governance highlights the CIA triad as the foundation of cybersecurity. (IIA GTAG: Information Security Governance)
Option C: Accessibility, accuracy, and effectiveness.
Incorrect. While these attributes are important in data management and usability, they do not directly define cybersecurity controls.
Option D: Authorization, logical access, and physical access.
Incorrect. While these are essential security components, they fall under broader IT security measures rather than forming the fundamental principles of cybersecurity.
Several organizations have developed a strategy to open co-owned shopping malls. What would be the primary purpose of this strategy?
To exploit core competence.
To increase market synergy.
To deliver enhanced value.
To reduce costs.
When multiple organizations co-own shopping malls, their primary strategy is to increase market synergy, meaning they combine resources and expertise to enhance market presence, attract more customers, and improve competitive positioning.
(A) To exploit core competence.
Incorrect: Core competencies refer to unique internal capabilities, whereas co-owning shopping malls is a collaborative market strategy.
(B) To increase market synergy. (Correct Answer)
Market synergy occurs when businesses collaborate to create greater market impact than they could individually.
Shared ownership enhances customer traffic, brand reach, and business opportunities.
IIA Standard 2110 – Governance highlights the importance of strategic partnerships in achieving synergy.
(C) To deliver enhanced value.
Incorrect: While value is a benefit, the main goal of co-ownership is strategic market advantage and synergy.
(D) To reduce costs.
Incorrect: Cost reduction may be a secondary benefit, but the primary goal is market synergy through shared resources and customer base expansion.
IIA Standard 2110 – Governance: Encourages strategic collaborations for business growth.
COSO ERM – Strategy and Objective-Setting: Highlights market synergy as a key factor in strategic partnerships.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because co-ownership of shopping malls primarily aims to increase market synergy, allowing organizations to leverage shared resources and customer networks for greater market impact.
The IT department maintains logs of user identification and authentication for all requests for access to the network. What is the primary purpose of these logs?
To ensure proper segregation of duties
To create a master repository of user passwords
To enable monitoring for systems efficiencies
To enable tracking of privileges granted to users over time
A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services. Which of the following best describes the restaurants strategy?
Diversification
Vertical integration
Risk avoidance
Differentiation
Vertical integration occurs when a company expands its operations into a different stage of its supply chain. In this case, the restaurant is moving from relying on third-party delivery services to handling its own delivery operations, which is an example of backward vertical integration (taking control of a process previously handled by an external provider).
(A) Incorrect – Diversification.
Diversification refers to entering a completely different industry or market (e.g., a restaurant launching a grocery store).
In this case, the restaurant is expanding within the same industry by adding delivery services.
(B) Correct – Vertical integration.
Vertical integration happens when a company takes control of another step in its supply chain.
Since the restaurant is now handling its own deliveries instead of outsourcing, this is an example of backward vertical integration.
(C) Incorrect – Risk avoidance.
Risk avoidance means eliminating an activity entirely to prevent exposure to risk (e.g., deciding not to offer delivery at all).
The restaurant is not avoiding risk but taking on additional responsibilities.
(D) Incorrect – Differentiation.
Differentiation is a strategy focused on making a product/service unique to stand out from competitors.
The restaurant is not introducing a unique feature but integrating delivery operations.
IIA’s Global Internal Audit Standards – Business Strategy and Risk Management
Defines vertical integration and its impact on operational control.
COSO’s ERM Framework – Strategic Risk Considerations
Discusses how vertical integration influences business risks and cost control.
Porter’s Competitive Strategies – Vertical Integration Analysis
Explains backward and forward integration in supply chain management.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following statements Is true regarding the use of centralized authority to govern an organization?
Fraud committed through collusion is more likely when authority is centralized.
Centralized managerial authority typically enhances certainty and consistency within an organization.
When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
Using separation of duties to mitigate collusion is reduced only when authority is centralized.
Centralized authority refers to decision-making being concentrated at the top levels of an organization, ensuring uniform policies and procedures across departments.
Let's analyze each option:
A. Fraud committed through collusion is more likely when authority is centralized.
Incorrect. Centralized authority reduces the chances of fraud by enforcing strict oversight and controls. Decentralized structures may create more opportunities for fraud due to inconsistent policies.
B. Centralized managerial authority typically enhances certainty and consistency within an organization. ✅ (Correct Answer)
Correct. Centralized authority ensures consistent decision-making, standardized processes, and clear policies, reducing uncertainty.
For example, in a multinational company, a centralized governance structure ensures compliance with financial reporting standards across all subsidiaries.
C. When authority is centralized, the alignment of activities to achieve business goals typically is decreased.
Incorrect. Centralized authority actually helps in aligning business activities toward strategic goals by ensuring uniform direction and coordination.
D. Using separation of duties to mitigate collusion is reduced only when authority is centralized.
Incorrect. Separation of duties (SoD) is a key internal control mechanism that exists regardless of centralization. Organizations implement SoD through policies, not just governance structures.
IIA Standard 2110 – Governance – Emphasizes the importance of clear governance structures in organizations.
COSO Internal Control – Integrated Framework – Discusses centralization and its impact on risk management and control effectiveness.
IIA Global Technology Audit Guide (GTAG) – Enterprise Risk Management (ERM) – Highlights the role of centralized authority in aligning corporate strategies.
ISO 37000:2021 – Governance of Organizations – Outlines how centralized governance improves organizational consistency and decision-making.
IIA References:
The board of directors wants to implement an incentive program for senior management that is specifically tied to the long-term health of the organization. Which of the following methods of compensation would be best to achieve this goal?
Commissions.
Stock options
Gain-sharing bonuses.
Allowances
The best method of compensation to align senior management incentives with the long-term health of the organization is stock options. Stock options encourage executives to focus on sustained growth and profitability rather than short-term gains, ensuring that their interests align with those of shareholders and stakeholders.
Long-Term Value Creation:
Stock options reward executives only if the company’s stock price appreciates over time.
This encourages leadership to focus on long-term profitability, operational efficiency, and sustainability.
Alignment with Shareholder Interests:
If the company performs well, stock prices rise, benefiting both shareholders and executives.
Poor decision-making that harms long-term value results in devalued stock options, discouraging risky short-term strategies.
Retention of Key Executives:
Stock options typically have a vesting period (e.g., 3-5 years), which helps retain top management and ensures commitment to long-term objectives.
Risk Management Considerations:
Unlike cash bonuses or short-term commissions, stock options require executives to consider risks and ethical decision-making over an extended period.
This supports the governance principles outlined by IIA’s International Standards for the Professional Practice of Internal Auditing (IPPF) – Standard 2110 (Governance), which emphasizes aligning incentives with risk tolerance and long-term objectives.
A. Commissions: These are typically tied to short-term sales performance rather than long-term strategic success.
C. Gain-sharing bonuses: These provide short-term financial rewards based on operational performance but do not incentivize sustained value creation.
D. Allowances: Fixed allowances do not fluctuate based on company performance and do not drive long-term strategic focus.
IIA Standard 2110 – Governance: Ensures that management incentives align with the organization's mission and risk tolerance.
IIA Practice Guide: Evaluating Corporate Governance: Emphasizes long-term incentive structures such as stock options to promote sustainable decision-making.
COSO Enterprise Risk Management (ERM) Framework: Highlights how executive compensation should support long-term organizational strategy.
Step-by-Step Justification:Why Not the Other Options?IIA References:
Which of the following statements regarding flat and hierarchical internal audit functions is true?
A flat structure creates an internal audit function that is highly knowledgeable and collaborative
A hierarchical structure requires little supervision, and the work performed is consistent and reliable
A flat structure allows for growth within the function and leads to the cultivation of diverse skills and fresh perspectives
A hierarchical structure tends to result in a higher cost base due to higher salaries to retain auditors with high knowledge and experience
In a hierarchical audit structure, work is reviewed across multiple levels of management, resulting in higher costs because highly skilled and experienced auditors are required for supervisory roles. This increases the cost base compared to a flat structure.
Option A exaggerates benefits of a flat structure. Option B is incorrect because hierarchical structures require more—not less—supervision. Option C is misleading because flat structures typically limit growth opportunities due to fewer layers of promotion.
Which of the following statements best describes the current state of data privacy regulation?
Regulations related to privacy are evolving and complex, and the number of laws is increasing
Most privacy laws are prescriptive and focused on organizations’ privacy rights
The concept of data privacy is well established, privacy regulations are mature, and minimal regulatory changes are expected
Because the concept of privacy is different around the world, data privacy is relatively unregulated
TESTED 18 Feb 2026