Which of the following capital budgeting techniques considers the tune value of money?
Annual rate of return.
Incremental analysis.
Discounted cash flow.
Cash payback
Capital budgeting techniques are used to evaluate investment projects by analyzing potential costs and benefits. One key consideration in capital budgeting is the time value of money (TVM), which states that a dollar received today is worth more than a dollar received in the future due to its earning potential.
Why Option C (Discounted cash flow) is Correct:
Discounted Cash Flow (DCF) explicitly incorporates the time value of money by discounting future cash flows to their present value.
Methods such as Net Present Value (NPV) and Internal Rate of Return (IRR) fall under DCF analysis, making them highly reliable for long-term capital budgeting decisions.
Why Other Options Are Incorrect:
Option A (Annual rate of return):
Incorrect because the annual rate of return (ARR) is based on accounting profits and does not consider the time value of money.
Option B (Incremental analysis):
Incorrect because incremental analysis is a decision-making tool that compares alternative costs and revenues but does not discount future cash flows.
Option D (Cash payback):
Incorrect because the payback period method only measures the time needed to recover an investment and ignores the time value of money.
IIA GTAG – "Auditing Capital Budgeting Decisions": Discusses the importance of time value of money in investment decisions.
COSO ERM Framework – "Risk Considerations in Financial Planning": Recommends using DCF methods for capital investment decisions.
IFRS & GAAP Financial Reporting Standards: Advocate for using DCF techniques for asset valuation and investment analysis.
IIA References:
Which of the following best explains the matching principle?
Revenues should be recognized when earned.
Revenue recognition is matched with cash.
Expense recognition is tied to revenue recognition.
Expenses are recognized at each accounting period.
The matching principle is a fundamental accounting concept that ensures that expenses are recorded in the same period as the revenues they help generate.
Why Option C (Expense recognition is tied to revenue recognition) is Correct:
The matching principle states that expenses should be recognized in the same period as the revenue they help generate to ensure accurate financial reporting.
This principle is applied in accrual accounting under GAAP and IFRS, ensuring that expenses and revenues are properly aligned.
Why Other Options Are Incorrect:
Option A (Revenues should be recognized when earned):
This describes the revenue recognition principle, not the matching principle.
Option B (Revenue recognition is matched with cash):
Incorrect because the matching principle applies to accrual accounting, not cash accounting. Revenue can be recognized before cash is received.
Option D (Expenses are recognized at each accounting period):
Incorrect because expenses are not necessarily recognized in every period; they are matched to revenue.
IIA Practice Guide – "Auditing Financial Reporting Controls": Discusses the importance of the matching principle.
GAAP & IFRS Accounting Standards: Define and require the application of the matching principle.
COSO Internal Control Framework: Emphasizes revenue-expense alignment for accurate financial reporting.
IIA References:
When executive compensation is based on the organization's financial results, which of the following situations is most likely to arise?
The organization reports inappropriate estimates and accruals due to poof accounting controls.
The organization uses an unreliable process forgathering and reporting executive compensation data.
The organization experiences increasing discontent of employees, if executives are eligible for compensation amounts that are deemed unreasonable.
The organization encourages employee behavior that is inconsistent with the interests of relevant stakeholders.
When executive compensation is tied to financial results, there is a strong incentive to manipulate financial reporting or focus solely on short-term performance at the expense of stakeholders’ interests.
Potential for Unethical Behavior:
Executives may prioritize profit-driven decisions (e.g., cost-cutting, aggressive revenue recognition) over long-term sustainability.
As per IIA Standard 2110 – Governance, incentive structures should align with ethical business practices and stakeholder interests.
Increased Risk of Fraud and Misrepresentation:
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Fraud Risk Management Guide highlights how executive incentives can lead to financial statement manipulation.
This could result in actions like aggressive revenue recognition, improper expense deferrals, or overstating earnings to boost compensation.
Misalignment with Stakeholder Interests:
Employees, customers, and investors suffer if executive compensation encourages short-term gains over long-term stability.
IIA GTAG 3: Continuous Auditing supports monitoring financial reporting risks to detect such inconsistencies.
A. The organization reports inappropriate estimates and accruals due to poor accounting controls. (Incorrect)
Reason: While poor controls can contribute to misstatements, the root cause in this scenario is compensation structure, not control weakness.
B. The organization uses an unreliable process for gathering and reporting executive compensation data. (Incorrect)
Reason: This issue relates to HR and payroll data integrity, not the impact of performance-based compensation on behavior.
C. The organization experiences increasing discontent of employees, if executives are eligible for compensation amounts that are deemed unreasonable. (Incorrect)
Reason: While excessive executive pay may cause employee dissatisfaction, the question focuses on behavioral impacts on stakeholders, making D the more relevant choice.
IIA Standard 2110 – Governance – Ensures executive compensation aligns with organizational ethics and stakeholder interests.
IIA Standard 2120 – Risk Management – Covers the risks associated with incentive-based compensation.
COSO Fraud Risk Management Guide – Discusses financial fraud linked to executive compensation.
IIA GTAG 3: Continuous Auditing – Supports risk-based monitoring of financial statements.
Why is Answer D Correct?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is D. The organization encourages employee behavior that is inconsistent with the interests of relevant stakeholders.
Which of the following can be viewed as a potential benefit of an enterprisewide resource planning system?
Real-time processing of transactions and elimination of data redundancies.
Fewer data processing errors and more efficient data exchange with trading partners.
Exploitation of opportunities and mitigation of risks associated with e-business.
Integration of business processes into multiple operating environments and databases.
Enterprise Resource Planning (ERP) systems integrate various business processes into a unified system, offering numerous benefits. Here's an analysis of the provided options:
A. Real-time Processing of Transactions and Elimination of Data Redundancies:
ERP systems centralize data and standardize processes across an organization. This centralization enables real-time processing of transactions, allowing immediate updates and access to data. By maintaining a single database for all business functions, ERPs eliminate data redundancies, ensuring consistency and accuracy across departments. This integration enhances decision-making and operational efficiency. According to Investopedia, ERP systems facilitate the free flow of communication between business areas, providing a single source of information and accurate, real-time data reporting.
Investopedia
B. Fewer Data Processing Errors and More Efficient Data Exchange with Trading Partners:
While ERP systems can reduce data processing errors through automation and standardized processes, efficient data exchange with trading partners often requires additional tools or modules, such as Electronic Data Interchange (EDI) systems. Therefore, this benefit is not solely attributable to ERP systems.
C. Exploitation of Opportunities and Mitigation of Risks Associated with E-Business:
ERP systems provide a robust infrastructure that can support e-business initiatives. However, effectively exploiting opportunities and mitigating risks in e-business also depend on strategic planning, market analysis, and additional technologies beyond the ERP system itself.
D. Integration of Business Processes into Multiple Operating Environments and Databases:
ERP systems aim to integrate business processes into a single operating environment with a unified database. Integrating into multiple operating environments and databases would contradict the primary purpose of an ERP, which is to provide a centralized platform.
In summary, the most significant benefit of an ERP system among the options provided is the real-time processing of transactions and the elimination of data redundancies, making option A the correct answer.
The internal auditor concluded there was a high likelihood that a significant wind farm development, worth $200 million, would be delayed from its approved schedule. As a result, electricity production would not start on time, leading to considerable financial penalties. Which of the following should be added to the observation to support its clarity and completeness?
The effect of the observation
The criteria of the observation
The condition of the observation
The cause of the observation
Audit observations should include condition, criteria, cause, and effect. In this case, the condition (delay risk), criteria (schedule), and effect (penalties) are already presented. What is missing is the cause—the underlying reason for the project delay. Identifying the cause ensures recommendations address the root of the problem.
After purchasing shoes from an online retailer, a customer continued to receive additional unsolicited offers from the retailer and other retailers who offer similar products.
Which of the following is the most likely control weakness demonstrated by the seller?
Excessive collecting of information
Application of social engineering
Retention of incomplete information.
Undue disclosure of information
The situation describes a scenario where a customer's personal information was shared with third parties without explicit consent, leading to unsolicited offers. This indicates a control weakness in data privacy and confidentiality, specifically the undue disclosure of information to external parties.
(A) Incorrect – Excessive collecting of information.
While collecting too much personal data can be a privacy concern, the issue here is not about data collection but how the data was shared.
(B) Incorrect – Application of social engineering.
Social engineering refers to deceptive tactics used to manipulate individuals into disclosing confidential information, which is not the case here.
(C) Incorrect – Retention of incomplete information.
The issue is not about missing or incomplete data but rather unauthorized sharing of data.
(D) Correct – Undue disclosure of information.
The retailer improperly shared the customer's personal data with other businesses, leading to unsolicited offers.
This represents a failure to comply with data privacy regulations (e.g., GDPR, CCPA).
IIA’s GTAG (Global Technology Audit Guide) – Data Privacy Risks and Controls
Highlights the risks associated with unauthorized data sharing.
NIST Cybersecurity Framework – Data Protection and Privacy
Emphasizes the importance of controlling access to customer information.
COSO’s ERM Framework – Information Governance and Compliance
Discusses the importance of data protection policies to prevent undue disclosure
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following is a systems software control?
Restricting server room access to specific individuals.
Housing servers with sensitive software away from environmental hazards.
Ensuring that all user requirements are documented.
Performing intrusion testing on a regular basis.
Comprehensive and Detailed In-Depth Explanation:
System software controls are mechanisms designed to protect system integrity, security, and performance. Among the given options, performing intrusion testing on a regular basis (D) is a proactive security measure that tests an organization's IT infrastructure to identify vulnerabilities and weaknesses in system security.
Option A (Restricting server room access) is a physical security control, not a system software control.
Option B (Housing servers securely) is an environmental control, focusing on protecting hardware.
Option C (Ensuring documentation of user requirements) relates to project management and system development, rather than system software security.
Since intrusion testing ensures system resilience against cyber threats, option D is the correct answer.
During the process of setting the annual audit plan, the chief audit executive receives a request from senior management to conduct an assurance engagement on the cybersecurity controls of the organization. Which of the following is a reason cybersecurity should be included in the annual internal audit plan?
In order to maintain good relationships with senior management
Cybersecurity is a new area for auditors to learn
Cybersecurity has been identified as a high risk during the annual risk assessment
The Global Internal Audit Standards require that all management-requested engagements be included in the annual internal audit plan
The internal audit plan must be risk-based, as required by the IIA Standards. If cybersecurity has been identified as a high risk during the annual risk assessment, then it should be included in the audit plan to provide assurance over the adequacy of controls.
Including engagements simply to satisfy management (Option A) or for auditor learning purposes (Option B) does not align with risk-based planning principles. Likewise, management requests alone (Option D) do not dictate audit plan content; engagements must be prioritized based on risk to the organization.
An internal auditor was assigned to test for ghost employees using data analytics. The auditor extracted employee data from human resources and payroll. Using spreadsheet functions, the auditor matched data sets by name and assumed that employees who were not present in each data set should be investigated further. However, the results seemed erroneous, as very few employees matched across all data sets. Which of the following data analytics steps has the auditor most likely omitted?
Data analysis.
Data diagnostics.
Data velocity.
Data normalization.
The auditor likely omitted the data normalization step, which is crucial when integrating multiple datasets from different sources (e.g., human resources (HR) and payroll). Without normalization, inconsistencies in formatting, naming conventions, or unique identifiers (e.g., employee ID vs. full name) can result in incorrect mismatches.
Standardization of Data Formats:
Employee names or IDs may be stored differently across systems (e.g., "John A. Doe" in HR vs. "Doe, John" in payroll).
Normalization ensures uniform formatting to enable accurate comparisons.
Removal of Duplicates & Inconsistencies:
Employee records could have multiple variations due to typos, abbreviations, or missing fields.
Proper cleaning and transformation of data ensures better accuracy.
Use of Unique Identifiers:
Instead of matching by name, the auditor should have used a unique identifier (e.g., Employee ID), which remains constant across systems.
A. Data analysis (Incorrect)
Reason: The auditor did attempt data analysis (matching employee records) but without proper preparation (normalization), the results were flawed.
B. Data diagnostics (Incorrect)
Reason: Data diagnostics refers to evaluating data quality issues, but it does not involve transforming data to a common format, which was the missing step.
C. Data velocity (Incorrect)
Reason: Data velocity relates to the speed at which data is processed, which is not relevant to the issue of incorrect matching.
IIA Global Technology Audit Guide (GTAG) 16: Data Analysis Technologies – Covers data quality, normalization, and audit data preparation.
IIA GTAG 3: Continuous Auditing – Discusses the importance of accurate data extraction and transformation.
IIA Standard 2320 – Analysis and Evaluation – Ensures appropriate data validation before concluding audit findings.
Why is Data Normalization Important?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is D. Data normalization.
Given the information below, which organization is in the weakest position to pay short-term debts?
Organization A: Current assets constitute $1,200,000; Current liabilities are $400,000
Organization B: Current assets constitute $1,000,000; Current liabilities are $1,000,000
Organization C: Current assets constitute $900,000; Current liabilities are $300,000
Organization D: Current assets constitute $1,000,000; Current liabilities are $250,000
Organization A
Organization B
Organization C
Organization D
A clothing company sells shirts for $8 per shirt. In order to break even, the company must sell 25.000 shirts. Actual sales total S300.000. What is margin of safety sales for the company?
$100.000
$200,000
$275,000
$500,000
Understanding the Margin of Safety Concept:
Margin of Safety (MoS) measures how much sales can drop before the business reaches its break-even point.
It is calculated as: Margin of Safety Sales=Actual Sales−Break-even Sales\text{Margin of Safety Sales} = \text{Actual Sales} - \text{Break-even Sales}Margin of Safety Sales=Actual Sales−Break-even Sales
Applying the Formula:
Selling Price per Shirt: $8
Break-even Sales Volume: 25,000 shirts
Break-even Sales Value: 25,000×8=200,00025,000 \times 8 = 200,00025,000×8=200,000
Actual Sales Revenue: $300,000
Margin of Safety: 300,000−100,000=200,000300,000 - 100,000 = 200,000300,000−100,000=200,000
Why Option B ($200,000) Is Correct?
The margin of safety is the difference between actual and break-even sales.
The correct calculation confirms $200,000 as the margin of safety.
IIA Standard 2120 – Risk Management supports financial risk analysis, including break-even and margin of safety evaluations.
Why Other Options Are Incorrect?
Option A ($100,000): Incorrect subtraction.
Option C ($275,000): Incorrect calculation, not based on break-even sales.
Option D ($500,000): Irrelevant and exceeds actual sales.
The correct margin of safety is $200,000, calculated using standard break-even analysis.
IIA Standard 2120 emphasizes financial risk evaluation in decision-making.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management (Financial Performance & Cost Analysis)
COSO ERM – Financial Stability & Revenue Risk
Management Accounting Best Practices – Break-even & Margin of Safety Calculations
Which of the following concepts of managerial accounting is focused on achieving a point of low or no inventory?
Theory of constraints.
Just-in-time method.
Activity-based costing.
Break-even analysis
The Just-in-Time (JIT) method is a managerial accounting and inventory management strategy that focuses on reducing or eliminating excess inventory by receiving goods only as needed.
(A) Theory of constraints.
Incorrect: The theory of constraints focuses on identifying and managing bottlenecks in production, not reducing inventory levels.
(B) Just-in-time method. (Correct Answer)
JIT aims to reduce waste, lower storage costs, and improve efficiency by ensuring that materials and products arrive only when needed.
IIA GTAG 3 – Continuous Auditing suggests monitoring inventory controls to align with JIT principles.
(C) Activity-based costing.
Incorrect: Activity-based costing allocates costs to activities based on usage, not inventory reduction.
(D) Break-even analysis.
Incorrect: Break-even analysis calculates the level of sales needed to cover costs but does not focus on inventory management.
IIA Standard 2120 – Risk Management: Encourages auditors to assess cost-management strategies like JIT.
IIA GTAG 3 – Continuous Auditing: Supports real-time monitoring of inventory to minimize excess stock.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) Just-in-Time (JIT) method, as it focuses on achieving low or no inventory to optimize efficiency and reduce costs.
Which of the following statements. Is most accurate concerning the management and audit of a web server?
The file transfer protocol (FTP) should always be enabled.
The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts.
The number of ports and protocols allowed to access the web server should be maximized.
Secure protocols for confidential pages should be used instead of dear-text protocols such as HTTP or FTP.
Importance of Secure Protocols for Web Server Management:
Web servers handle sensitive data, including user credentials, financial information, and confidential communications.
Using secure protocols like HTTPS, SFTP, and TLS-encrypted SMTP ensures data is encrypted and protected from cyber threats.
Risks of Clear-Text Protocols (HTTP & FTP):
HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) transmit data in plaintext, making them vulnerable to man-in-the-middle (MITM) attacks, packet sniffing, and unauthorized access.
SFTP (Secure File Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) encrypt data, mitigating these risks.
Why Other Options Are Incorrect:
A. The file transfer protocol (FTP) should always be enabled – Incorrect.
FTP is not secure, and enabling it can expose the server to unauthorized file access and cyberattacks.
B. The simple mail transfer protocol (SMTP) should be operating under the most privileged accounts – Incorrect.
SMTP should operate with minimal privileges to reduce security risks in case of a breach.
C. The number of ports and protocols allowed to access the web server should be maximized – Incorrect.
Minimizing open ports and protocols reduces the attack surface and limits unauthorized access.
IIA’s Perspective on IT Security and Web Server Management:
IIA Standard 2110 – Governance requires organizations to establish secure IT practices, including encryption and secure protocols.
IIA GTAG (Global Technology Audit Guide) on IT Risks emphasizes minimizing security vulnerabilities by using encrypted communication.
ISO 27001 Security Standard recommends secure transmission protocols for protecting sensitive data.
IIA References:
IIA Standard 2110 – IT Security and Governance
IIA GTAG – IT Risks and Secure Web Server Management
ISO 27001 Security Standard – Data Encryption and Secure Transmission
Thus, the correct and verified answer is D. Secure protocols for confidential pages should be used instead of clear-text protocols such as HTTP or FTP.
Which of the following best describes meaningful recommendations for corrective actions?
Recommendations that address the gap between the condition and consequence and provide at least short-term fixes
Recommendations that address the gap between the criteria and condition and provide at least short-term fixes
Recommendations that address the gap between the criteria and consequence and provide long-term solutions
Recommendations that address the gap between the criteria and condition and provide long-term solutions
Meaningful recommendations are those that address the root cause of the condition by comparing it to the established criteria and propose sustainable, long-term solutions. This ensures that the identified issue will not recur and strengthens the control environment.
Option A relates to symptoms (condition vs. consequence), not root causes. Option B identifies the correct gap (criteria vs. condition) but offers only short-term fixes. Option C incorrectly compares criteria to consequence, which is not a valid basis for audit recommendations.
Thus, Option D is correct.
A new chief audit executive (CAE) reviews long overdue audit recommendations, which have been repeatedly reported to senior management but have not been implemented, and is unsure which issues should be escalated to the board. Which of the following would serve as the best guide in this scenario?
The CAE's personal judgment
The organization's code of conduct
The organization's risk acceptance policy
The organization's internal audit charter
The CAE should use the organization’s risk acceptance policy to determine when unimplemented audit recommendations represent risks that exceed acceptable tolerance. This ensures consistency with governance frameworks and prevents reliance solely on personal judgment.
Option A lacks formal criteria and would not ensure consistency. The code of conduct (Option B) addresses ethical behavior, not risk acceptance. The audit charter (Option D) defines internal audit’s authority and responsibility but does not guide which issues must be escalated.
Which of the following cost of capital methods identifies the time period required to recover She cost of the capital investment from the annual inflow produced?
Cash payback technique
Annual rate of return technique.
Internal rate of return method.
Net present value method.
The cash payback technique determines the time required to recover the initial capital investment from annual cash inflows. It is one of the simplest capital budgeting methods, focusing on liquidity and risk reduction.
The payback period helps management assess the risk of investment decisions.
Shorter payback periods indicate faster capital recovery, which is desirable for risk-averse firms.
The IIA’s Practice Guide: Financial Decision-Making supports the use of payback analysis for assessing capital investments.
B. Annual rate of return technique → Incorrect. This method calculates the percentage return on an investment but does not measure how long it takes to recover the investment.
C. Internal rate of return (IRR) method → Incorrect. IRR determines the discount rate at which the investment's net present value (NPV) is zero, but it does not calculate the payback period.
D. Net present value (NPV) method → Incorrect. NPV considers the time value of money but focuses on overall profitability, not the time required to recover initial investment.
IIA’s Global Internal Audit Standards on Capital Budgeting and Investment Analysis recommend payback period analysis for investment risk assessment.
IIA Standard 2130 – Control Self-Assessment highlights financial viability and risk analysis in investment decision-making.
COSO Enterprise Risk Management (ERM) Framework supports the use of the payback method for risk mitigation in capital projects.
Why Option A is Correct?Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is A. Cash payback technique.
Based on lest results, an IT auditor concluded that the organization would suffer unacceptable loss of data if there was a disaster at its data center. Which of the following test results would likely lead the auditor to this conclusion?
Requested backup tapes were not returned from the offsite vendor In a timely manner.
Returned backup tapes from the offsite vendor contained empty spaces.
Critical systems have boon backed up more frequently than required.
Critical system backup tapes are taken off site less frequently than required
Understanding IT Backup Risks in Disaster Recovery:
Disaster recovery plans rely on backup data to restore operations after a system failure.
An ineffective backup system increases the risk of data loss, operational downtime, and regulatory non-compliance.
Why Option B (Empty Backup Tapes) Is Correct?
If backup tapes contain empty spaces, it indicates data corruption or incomplete backups, leading to unrecoverable data loss in a disaster.
IIA GTAG 16 – Data Management and IT Auditing emphasizes that backups must be tested for integrity and completeness.
ISO 27001 and NIST SP 800-34 recommend periodic verification of backup data to prevent critical failures.
Why Other Options Are Incorrect?
Option A (Delayed return of backup tapes):
While delayed tape retrieval affects recovery speed, it does not indicate data loss.
Option C (More frequent backups than required):
Frequent backups improve data protection, not cause unacceptable loss.
Option D (Less frequent offsite backups):
While infrequent backups increase risk, they do not directly indicate data loss upon testing.
Backup tapes containing empty spaces indicate potential data loss, making it the most critical disaster recovery risk.
IIA GTAG 16, ISO 27001, and NIST SP 800-34 highlight the need for validated backup integrity.
Final Justification:IIA References:
IIA GTAG 16 – Data Management and IT Auditing
ISO 27001 – Information Security Backup Standards
NIST SP 800-34 – Contingency Planning for IT Systems
A large retail customer made an offer to buy 10.000 units at a special price of $7 per unit. The manufacturer usually sells each unit for §10, Variable Manufacturing costs are 55 per unit and fixed manufacturing costs are $3 per unit. For the manufacturer to accept the offer, which of the following assumptions needs to be true?
Fixed and Variable manufacturing costs are less than the special offer selling price.
The manufacturer can fulfill the order without expanding the capacities of the production facilities.
Costs related to accepting this offer can be absorbed through the sale of other products.
The manufacturer’s production facilities are currently operating at full capacity.
When evaluating a special order, the manufacturer must determine if accepting it will be profitable without disrupting normal operations. The key consideration is whether the company has spare production capacity to handle the order without increasing fixed costs.
Correct Answer (B - The Manufacturer Can Fulfill the Order Without Expanding Production Facilities)
Fixed costs ($3 per unit) are already incurred and will not change if the order is accepted.
The special price ($7 per unit) covers the variable costs ($5 per unit), contributing $2 per unit to profit.
If the manufacturer has excess production capacity, the order is profitable.
The IIA Practice Guide: Auditing Financial Performance emphasizes that special order decisions should be based on incremental cost analysis, ensuring no need for capacity expansion.
Why Other Options Are Incorrect:
Option A (Fixed and Variable Manufacturing Costs Are Less Than the Special Offer Selling Price):
Fixed costs should not be considered in short-term pricing decisions if they are already incurred.
Option C (Costs Related to Accepting This Offer Can Be Absorbed Through the Sale of Other Products):
The decision should be based on whether the order is profitable on its own, not relying on other products.
Option D (The Manufacturer’s Production Facilities Are Operating at Full Capacity):
If the company is at full capacity, accepting the order would require sacrificing existing sales or expanding capacity, which increases costs.
IIA Practice Guide: Auditing Financial Performance – Discusses cost analysis for special pricing decisions.
IIA GTAG 13: Business Performance – Covers incremental cost and profitability analysis in pricing decisions.
Step-by-Step Explanation:IIA References for Validation:Thus, B is the correct answer because accepting the order is only profitable if the manufacturer has excess capacity.
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization's critical data
A physical control is a security measure designed to protect assets, facilities, and personnel from physical threats such as fire, theft, or unauthorized access. Fire detection and suppression equipment (e.g., fire alarms, sprinklers, extinguishers) directly protects physical assets, making it a clear example of a physical control.
(A) Providing fire detection and suppression equipment. ✅
Correct. This is a direct physical security control that helps mitigate fire risks by detecting and suppressing fires.
IIA GTAG "Physical Security and IT Asset Protection" identifies fire detection as an essential physical security measure.
(B) Establishing a physical security policy and promoting it throughout the organization. ❌
Incorrect. A policy is an administrative control, not a physical control. While important, it does not provide direct physical protection.
(C) Performing business continuity and disaster recovery planning. ❌
Incorrect. This is a procedural control, not a physical one. Planning for disasters does not physically secure assets but instead prepares an organization for recovery.
(D) Keeping an offsite backup of the organization's critical data. ❌
Incorrect. This is an IT security control, ensuring data availability rather than physically protecting assets.
IIA GTAG – "Physical Security and IT Asset Protection"
IIA Standard 2110 – Governance (Risk Management Controls)
COBIT Framework – Physical and Environmental Security Controls
Analysis of Answer Choices:IIA References:Thus, the correct answer is A, as fire detection and suppression equipment provides direct physical protection against fire-related risks.
Which of the following best describes the use of predictive analytics?
A supplier of electrical parts analyzed an instances where different types of spare parts were out of stock prior to scheduled deliveries of those parts.
A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
A supplier of electrical parts analyzed all instances of a part being, out of stock poor to its scheduled delivery date and discovered that increases in sales of that part consistently correlated with stormy weather.
A supplier of electrical parts analyzed sales and stock information and modelled different scenarios for making decisions on stock reordering and delivery
Understanding Predictive Analytics:
Predictive analytics involves using historical data, statistical algorithms, and machine learning techniques to forecast future trends and behaviors.
It applies assumptions and models patterns to predict outcomes, helping businesses make proactive decisions.
Why Option B is Correct:
Predictive analytics is forward-looking and uses assumptions (e.g., weather conditions) to predict where stock levels would decrease more quickly.
This aligns with the goal of predictive analytics: forecasting potential events before they occur.
Why Other Options Are Incorrect:
A. Analyzed instances where parts were out of stock before scheduled deliveries: This is descriptive analytics, as it looks at past data without making future predictions.
C. Analyzed past stockouts and found a correlation with stormy weather: This is diagnostic analytics, as it identifies past correlations but does not predict future trends.
D. Modeled different scenarios for stock reordering and delivery decisions: This is prescriptive analytics, which focuses on decision-making rather than predictions.
IIA Standards and References:
IIA GTAG on Data Analytics (2017): Highlights predictive analytics as a tool for forecasting risks and operational inefficiencies.
IIA Standard 1220 – Due Professional Care: Encourages auditors to use analytical techniques to anticipate potential issues.
COSO ERM Framework: Supports the use of predictive models to improve risk management and strategic planning.
Thus, the correct answer is B: A supplier of electrical parts analyzed sales, applied assumptions related to weather conditions, and identified locations where stock levels would decrease more quickly.
Which of the following statements is true regarding an organization's chief audit executive (CAE) when prioritizing the audit universe?
The CAE uses the risk-factor approach to prioritize the audit universe
The CAE uses risk likelihood scores to prioritize the audit universe
The CAE uses risk impact scores to prioritize the audit universe
The CAE uses heat maps to prioritize the audit universe
When prioritizing the audit universe, the CAE typically uses a risk-factor approach. This includes a combination of likelihood, impact, control effectiveness, and other relevant criteria. Solely relying on impact (Option C) or likelihood (Option B) is insufficient. Heat maps (Option D) may be tools used within the process, but they are not the actual method of prioritization.
Thus, the correct description is the risk-factor approach (Option A).
Which of the following attributes of data is most likely to be compromised in an organization with a weak data governance culture?
Variety.
Velocity.
Volume.
Veracity.
Data governance refers to the policies, processes, and controls an organization implements to ensure data integrity, security, and compliance. When an organization has a weak data governance culture, the most compromised attribute of data is "veracity," which refers to the accuracy, reliability, and trustworthiness of data.
Why Option D (Veracity) is Correct:
Weak data governance leads to poor data quality, inconsistencies, and errors, reducing data veracity (trustworthiness and accuracy).
Without strong governance, data may be incomplete, outdated, or manipulated, leading to flawed decision-making.
Data veracity is critical for risk management, internal audit, and regulatory compliance, as unreliable data can lead to financial misstatements and operational risks.
Why Other Options Are Incorrect:
Option A (Variety):
Variety refers to different types and sources of data (structured, unstructured, semi-structured).
A weak data governance culture does not necessarily affect the diversity of data sources.
Option B (Velocity):
Velocity refers to the speed at which data is generated, processed, and analyzed.
Weak governance impacts data quality more than processing speed.
Option C (Volume):
Volume refers to the quantity of data being processed and stored.
Weak data governance might lead to data duplication or loss but does not directly impact data volume.
IIA GTAG – "Auditing Data Governance": Emphasizes the importance of data veracity in decision-making.
COSO Internal Control Framework: Highlights the role of data integrity in financial and operational controls.
IIA’s Global Technology Audit Guide on Data Analytics: Discusses the risks of poor data governance affecting veracity.
IIA References:
Which of the following best describes a man-in-the-middle cyber-attack?
The perpetrator is able to delete data on the network without physical access to the device.
The perpetrator is able to exploit network activities for unapproved purposes.
The perpetrator is able to take over control of data communication in transit and replace traffic.
The perpetrator is able to disable default security controls and introduce additional vulnerabilities
Understanding a Man-in-the-Middle (MITM) Attack:
A Man-in-the-Middle (MITM) attack occurs when a cybercriminal intercepts, alters, or steals data while it is being transmitted between two parties.
The attacker can modify messages, inject malicious content, or eavesdrop on sensitive communications without the knowledge of the sender or receiver.
How MITM Attacks Work:
Attackers position themselves between two communicating parties (e.g., a user and a banking website) and intercept the data exchange.
This allows them to steal login credentials, financial information, or confidential communications.
Common MITM attack methods include:
Wi-Fi eavesdropping (public network interception).
Session hijacking (stealing active user sessions).
HTTPS spoofing (tricking users into thinking they are on a secure website).
Why Other Options Are Incorrect:
A. The perpetrator is able to delete data on the network without physical access to the device – Incorrect.
This describes a remote cyberattack, such as malware or ransomware, rather than MITM, which focuses on data interception.
B. The perpetrator is able to exploit network activities for unapproved purposes – Incorrect.
This is too broad and could refer to insider threats, malware, or privilege escalation attacks, rather than specifically MITM.
D. The perpetrator is able to disable default security controls and introduce additional vulnerabilities – Incorrect.
This describes a system exploitation attack, such as a rootkit or backdoor installation, not an MITM attack.
IIA’s Perspective on Cybersecurity and IT Risk Management:
IIA Standard 2110 – Governance requires organizations to implement cybersecurity controls to mitigate risks like MITM attacks.
IIA GTAG (Global Technology Audit Guide) on Cybersecurity Risks advises organizations to use encryption (e.g., TLS, VPNs) to protect data in transit.
NIST Cybersecurity Framework recommends multi-factor authentication (MFA) and secure protocols to prevent MITM attacks.
IIA References:
IIA Standard 2110 – IT Security and Cyber Risk Governance
IIA GTAG – Cybersecurity Controls and Threat Mitigation
NIST Cybersecurity Framework – Secure Data Transmission
Thus, the correct and verified answer is C. The perpetrator is able to take over control of data communication in transit and replace traffic.
An organization requires an average of 5S days to convert raw materials into finished products to sell. An average of 42 additional days is required to collect receivables. If the organization takes an average of 10 days to pay for the raw materials, how long is its total cash conversion cycle?
26 days.
90 days,
100 days.
110 days
Understanding the Cash Conversion Cycle (CCC):
The Cash Conversion Cycle (CCC) measures the time taken for a company to convert raw materials into cash flow.
CCC is calculated using the formula: CCC=DaysInventoryOutstanding(DIO)+DaysSalesOutstanding(DSO)−DaysPayableOutstanding(DPO)CCC = Days Inventory Outstanding (DIO) + Days Sales Outstanding (DSO) - Days Payable Outstanding (DPO)CCC=DaysInventoryOutstanding(DIO)+DaysSalesOutstanding(DSO)−DaysPayableOutstanding(DPO)
Where:
DIO (Days Inventory Outstanding) = 55 days (time to convert raw materials to finished products).
DSO (Days Sales Outstanding) = 42 days (time to collect receivables).
DPO (Days Payable Outstanding) = 10 days (time to pay for raw materials).
Applying the Formula:
CCC=55+42−10CCC = 55 + 42 - 10CCC=55+42−10 CCC=100 daysCCC = 100 \text{ days}CCC=100 days
Why Option C (100 Days) Is Correct?
The CCC represents the time the company’s cash is tied up in production and sales before receiving payment.
This calculation aligns with IIA Standard 2120 – Risk Management, which requires auditors to assess financial liquidity and operational efficiency.
Why Other Options Are Incorrect?
Option A (26 days): Incorrect calculation.
Option B (90 days): Does not subtract DPO correctly.
Option D (110 days): Incorrect addition of all components instead of following the CCC formula.
The correct cash conversion cycle is 100 days, calculated using standard CCC methodology.
IIA Standard 2120 and financial management principles confirm the correct calculation.
Final Justification:IIA References:
IPPF Standard 2120 – Risk Management (Financial Performance & Liquidity Risk)
COSO ERM – Working Capital & Cash Flow Management
Financial Management Best Practices – Cash Conversion Cycle Analysis
Which of the following scenarios best illustrates a spear phishing attack?
Numerous and consistent attacks on the company's website caused the server to crash and service was disrupted.
A person posing as a representative of the company's IT help desk called several employees and played a generic prerecorded message requesting password data.
A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.
Many users of a social network service received fake notifications of a unique opportunity to invest in a new product
A spear phishing attack is a targeted email attack aimed at a specific individual, organization, or business. Unlike general phishing, which casts a wide net, spear phishing is highly personalized and designed to deceive the recipient into providing sensitive information.
Personalization – The email references a golf membership renewal, making it relevant and believable to the recipient.
Social Engineering – The attacker exploits the victim’s trust by pretending to be a legitimate entity.
Malicious Link – The victim clicks a fraudulent hyperlink and enters sensitive credit card details.
Financial Fraud – The goal is to steal payment information, leading to unauthorized transactions.
A. Numerous and consistent attacks on the company’s website caused the server to crash.
This describes a Denial-of-Service (DoS) attack, not spear phishing.
B. A person posing as an IT help desk representative called employees and played a generic message requesting passwords.
This describes vishing (voice phishing) rather than spear phishing.
D. Many users of a social network service received fake notifications about a new investment opportunity.
This is general phishing, as it targets multiple users instead of one individual.
IIA’s GTAG (Global Technology Audit Guide) on Cybersecurity – Emphasizes the risk of spear phishing in cyber fraud.
NIST SP 800-61 (Computer Security Incident Handling Guide) – Defines spear phishing as a highly targeted attack method.
COBIT 2019 (Governance and Management of IT) – Highlights social engineering risks in IT security.
Why Option C is Correct?Why Not the Other Options?IIA References:✅ Final Answer: C. A person received a personalized email regarding a golf membership renewal, and he clicked a hyperlink to enter his credit card data into a fake website.
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of Infringement on local regulations, such as copyright or privacy laws?
Not installing anti-malware software
Updating operating software in a haphazard manner,
Applying a weak password for access to a mobile device.
JoIIbreaking a locked smart device
Understanding BYOD Risks and Legal Implications
Bring-your-own-device (BYOD) policies allow employees to use personal devices for work, but they introduce compliance risks.
Jailbreaking is the process of bypassing manufacturer-imposed security restrictions on a device (e.g., iPhones or Android devices).
This significantly increases the risk of privacy law violations, copyright infringements, and security breaches.
Why Option D is Correct?
Jailbreaking allows users to:
Install unauthorized software, which may violate software licensing agreements and copyright laws.
Remove security restrictions, increasing exposure to data breaches, malware, and non-compliance with privacy regulations (e.g., GDPR, HIPAA, or CCPA).
Bypass digital rights management (DRM), leading to potential copyright infringement issues.
IIA Standard 2110 – Governance mandates that internal auditors evaluate IT risks, including legal compliance related to mobile device usage.
ISO 27001 – Information Security Management also highlights the risks of unapproved software on enterprise devices.
Why Other Options Are Incorrect?
Option A (Not installing anti-malware software):
While a security risk, this primarily exposes devices to cyber threats rather than directly causing regulatory infringements.
Option B (Updating operating software in a haphazard manner):
Irregular updates pose security risks, but they do not directly violate copyright or privacy laws.
Option C (Applying a weak password):
Weak passwords increase security risks, but they do not inherently cause regulatory infringements like jailbreaking does.
Jailbreaking increases risks of copyright infringement (through unauthorized apps) and privacy violations (by removing security controls).
IIA Standard 2110 and ISO 27001 emphasize legal and regulatory compliance in IT security audits.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT & Legal Compliance Risks)
ISO 27001 – Information Security Compliance
GDPR, HIPAA, and CCPA – Privacy Law Considerations for BYOD
Which of the following is the most appropriate way to record each partner’s initial investment in a partnership?
At the value agreed upon by the partners
At book value
At fair value
At the original cost
Which of the following is most influenced by a retained earnings policy?
Cash.
Dividends.
Gross margin.
Net income.
A retained earnings policy determines how much of a company’s net income is retained (kept in the business) versus distributed to shareholders as dividends.
(A) Cash.
Incorrect: While retained earnings affect the company’s financial position, they do not directly impact cash flow, as retained earnings can be reinvested in non-cash assets.
(B) Dividends. (Correct Answer)
A retained earnings policy directly influences dividend payouts.
More retained earnings = lower dividends; less retained earnings = higher dividends.
IIA Standard 2110 (Governance) requires oversight of dividend policies as part of corporate governance.
COSO ERM – Risk Response suggests that dividend policies should align with strategic financial goals.
(C) Gross margin.
Incorrect: Gross margin is determined by revenue and cost of goods sold (COGS), not retained earnings.
(D) Net income.
Incorrect: Net income is calculated before retained earnings are determined, so the policy does not influence net income directly.
IIA Standard 2110 – Governance: Covers policies impacting financial distributions.
COSO ERM – Risk Response: Suggests that retained earnings policies influence financial stability and investor decisions.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because a retained earnings policy primarily affects the amount of dividends paid to shareholders.
According to IIA guidance, which of the following statements is true regarding communication of engagement results?
Prior to releasing engagement results to parties outside of the organization, the audit committee must assess the potential risk to the organization, consult with senior management and/or legal counsel, and control dissemination by restricting the use of the results
During an advisory engagement, if a significant governance issue is identified, it must be communicated to senior management and the board
The engagement supervisor is responsible for communicating the final results to the chief audit executive and other parties who can ensure that the results are given due consideration
The audit committee is responsible for reviewing and approving the final engagement communication before issuance and for deciding to whom and how it will be disseminated
The IIA Standards require that significant governance, risk management, or control issues be communicated to senior management and the board, regardless of whether they arise from assurance or advisory engagements.
Option A is misleading, as it overstates the audit committee’s role. Option C is incorrect because responsibility for final communication lies with the CAE, not the supervisor. Option D is also incorrect since the audit committee does not approve every report; that responsibility rests with internal audit leadership.
Which of the following types of accounts must be closed at the end of the period?
Income statement accounts.
Balance sheet accounts.
Permanent accounts.
Real accounts.
At the end of an accounting period, certain accounts must be closed to prepare financial statements and reset balances for the next period. The accounts that must be closed are temporary accounts, which include all income statement accounts (revenues, expenses, and gains/losses).
Why Option A (Income statement accounts) is Correct:
Income statement accounts (revenues, expenses, gains, and losses) are temporary accounts that track financial performance for a specific period.
At the end of the period, these accounts are closed to the retained earnings account to reset them to zero for the next period.
Why Other Options Are Incorrect:
Option B (Balance sheet accounts):
Incorrect because balance sheet accounts (assets, liabilities, and equity) are permanent accounts that carry their balances forward to the next period.
Option C (Permanent accounts):
Incorrect because permanent accounts include all balance sheet accounts, which are never closed.
Option D (Real accounts):
Incorrect because real accounts refer to balance sheet accounts (assets, liabilities, and equity), which remain open.
IIA GTAG – "Auditing Financial Close Processes": Discusses the closing of temporary accounts at the period end.
COSO Internal Control – Integrated Framework: Recommends proper financial reporting controls, including account closures.
IFRS & GAAP Accounting Standards: Define temporary and permanent accounts in financial reporting.
IIA References:Thus, the correct answer is A. Income statement accounts.
In a final audit report, internal auditors drafted the following management action plan with a due date of the last day of the calendar year:
"Plan: A bank reconciliation template has been updated to address issues with formulas incorrectly calculating variances."
Which critical element of the action plan is missing?
The responsible personnel
The status of the action plan
A referral to the policy or procedure
The level of risk
A management action plan should include: (1) corrective action, (2) responsible personnel, and (3) implementation timeline. In this case, while the corrective action and due date are included, the responsible personnel is missing, which is critical for accountability.
Option B (status) is tracked later during follow-up. Option C (policy reference) is not mandatory. Option D (risk level) belongs to the observation, not the action plan.
Which of the following should internal auditors be attentive of when reviewing personal data consent and opt-in/opt-out management process?
Whether customers are asked to renew their consent for their data processing at least quarterly.
Whether private data is processed in accordance with the purpose for which the consent was obtained?
Whether the organization has established explicit and entitywide policies on data transfer to third parties.
Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems.
When reviewing personal data consent and opt-in/opt-out management processes, internal auditors should focus on ensuring compliance with data protection regulations, such as the General Data Protection Regulation (GDPR) and other applicable data privacy laws. The most critical aspect is ensuring that personal data is processed strictly in line with the consent obtained from individuals.
Data Processing in Accordance with Consent (Correct Choice: B)
IIA Standard 2110 – Governance requires internal auditors to assess whether the organization has effective processes for ensuring compliance with laws and regulations, including data privacy obligations.
GDPR Article 5(1)(b) (Purpose Limitation Principle) mandates that personal data must be collected for specified, explicit, and legitimate purposes and must not be further processed in a manner incompatible with those purposes.
Internal auditors should verify that the organization adheres to this principle by ensuring that data is only used for the purpose for which consent was granted.
Why the Other Options Are Incorrect:
Option A: "Whether customers are asked to renew their consent for their data processing at least quarterly." (Incorrect)
GDPR does not mandate a quarterly renewal of consent. Instead, it requires that consent be freely given, specific, informed, and unambiguous. Periodic renewal may be advisable in some cases, but it is not a strict regulatory requirement.
IIA Standard 2120 – Risk Management requires auditors to evaluate compliance risk exposure, but excessive consent renewals could lead to inefficiencies without adding value.
Option C: "Whether the organization has established explicit and entitywide policies on data transfer to third parties." (Incorrect)
While data transfer policies are critical (as required under GDPR Articles 44-50 on international data transfers), they do not directly relate to the opt-in/opt-out process or consent management.
IIA Standard 2201 – Engagement Planning encourages reviewing policies, but the key focus should be on processing data according to the purpose of consent.
Option D: "Whether customers have an opportunity to opt-out the right to be forgotten from organizational records and systems." (Incorrect)
The right to be forgotten (GDPR Article 17) allows individuals to request data deletion, but it is not an opt-out feature in the traditional sense. Organizations must evaluate each request based on legal grounds before erasing data.
IIA Standard 2130 – Compliance requires verifying whether the organization ensures compliance with data privacy rights, but an opt-out for the right to be forgotten is not a primary audit focus.
IIA Standard 2110 – Governance (Ensuring regulatory compliance)
IIA Standard 2120 – Risk Management (Managing data privacy risks)
IIA Standard 2130 – Compliance (Reviewing legal obligations on personal data)
IIA Standard 2201 – Engagement Planning (Evaluating policies and controls)
GDPR Article 5(1)(b) – Purpose Limitation Principle (Processing data as per consent)
GDPR Articles 17, 44-50 (Data protection and right to be forgotten considerations)
Step-by-Step Justification for the Answer:IIA References for This Answer:Thus, Option B is the correct choice as it aligns with the purpose limitation principle and internal audit’s role in assessing compliance with data protection laws.
A major IT project is scheduled to be implemented over a three-month period during the year. The chief audit executive (CAE) scheduled significant audit resources to provide consultation. Due to technical challenges from a supplier, the project is postponed until the following year. What should the CAE do in this case?
Communicate to the IT project manager that the audit resources are still available to his department for other projects
Reassign the available audit resources to other areas of risk and advise the respective managers in those areas
Amend the plan accordingly and advise the board and senior management for their review and approval
Keep the available resources unassigned so that they are able to take on any ad hoc assignment that may arise
The internal audit plan must remain dynamic and responsive to changes in circumstances. If a key project is postponed, the CAE should amend the audit plan, reallocate resources appropriately, and inform the board and senior management for review and approval. This ensures transparency and continued alignment with organizational risks.
Option A improperly shifts audit resources under management’s direction. Option B may be considered but requires board and management approval through an amended plan. Option D leaves resources idle, which is inefficient.
For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?
An incorrect program fix was implemented just prior to the database backup.
The organization is preparing to train all employees on the new self-service benefits system.
There was a data center failure that requires restoring the system at the backup site.
There is a need to access prior year-end training reports for all employees in the human resources database
The most recent backup is primarily used to restore lost data in the event of a system failure, data corruption, or cyberattack. If a data center failure occurs, the latest backup is the best source to recover the human resources database and resume operations.
(A) Incorrect – An incorrect program fix was implemented just prior to the database backup.
If an incorrect fix was applied before the backup, restoring the latest backup would still contain the error.
The organization would need to restore an earlier version before the faulty update.
(B) Incorrect – The organization is preparing to train all employees on the new self-service benefits system.
The latest backup is not needed for training; the live system or historical data would be used instead.
(C) Correct – There was a data center failure that requires restoring the system at the backup site.
In the event of a system failure, restoring from the most recent backup minimizes data loss and downtime.
This is the primary reason for maintaining regular backups.
(D) Incorrect – There is a need to access prior year-end training reports for all employees in the human resources database.
Historical records would likely be stored in archived backups or reports, not the latest backup.
The most recent backup contains current data, not old reports.
IIA’s GTAG (Global Technology Audit Guide) – IT Disaster Recovery and Backup Strategies
Covers the importance of backups in system restoration.
NIST Cybersecurity Framework – Data Recovery and Business Continuity
Recommends frequent backups to protect against system failures.
ISO 22301 – Business Continuity Management
Defines recovery procedures and best practices for backup site restoration.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following best describes a transformational leader, as opposed to a transactional leader?
The leader searches for deviations from the rules and standards and intervenes when deviations exist.
The leader intervenes only when performance standards are not met.
The leader intervenes to communicate high expectations.
The leader does not intervene to promote problem-solving
A transformational leader focuses on inspiring and motivating employees to exceed expectations, emphasizing vision, innovation, and long-term goals rather than just rule enforcement or performance monitoring.
(A) The leader searches for deviations from the rules and standards and intervenes when deviations exist.
Incorrect: This describes a transactional leader, who focuses on correcting errors and enforcing rules rather than inspiring employees.
(B) The leader intervenes only when performance standards are not met.
Incorrect: This describes a passive transactional leader, who waits for issues before taking action.
(C) The leader intervenes to communicate high expectations. (Correct Answer)
Transformational leaders set high expectations, inspire employees to achieve them, and foster a culture of continuous improvement.
IIA Standard 2110 – Governance highlights the importance of leadership in driving organizational performance.
Transformational leadership aligns with COSO’s principles of strong governance and strategic vision.
(D) The leader does not intervene to promote problem-solving.
Incorrect: A transformational leader actively promotes problem-solving by encouraging innovation and continuous improvement.
IIA Standard 2110 – Governance: Recognizes leadership's role in fostering a strong ethical and performance-driven culture.
COSO ERM – Governance and Culture: Highlights leadership’s role in shaping strategic direction.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (C) because a transformational leader inspires employees by setting high expectations and motivating them to achieve organizational goals.
At which fundamental level of a quality assurance and improvement program is an opinion expressed about the entire spectrum of the internal audit function’s work?
At the external perspective level
At the internal audit function level
At the internal audit engagement level
At the self-assessment activity level
The QAIP (Quality Assurance and Improvement Program) expresses an opinion at the internal audit function level about the overall efficiency, effectiveness, and conformance with the Standards. Engagement-level reviews assess quality for individual audits, but the overall opinion covers the full internal audit activity.
Options A and D describe perspectives within reviews but do not represent the overall opinion. Option C refers only to engagement-specific assurance, not the full function.
An internal auditor has requested the organizational chart in order to evaluate the control environment of an organization. Which of the following is a disadvantage of using the organizational chart?
The organizational chart shows only formal relationships.
The organizational chart shows only the line of authority.
The organizational chart shows only the senior management positions.
The organizational chart is irrelevant when testing the control environment.
An organizational chart is a visual representation of the company's structure, depicting reporting lines and hierarchical relationships. However, it has limitations when assessing the control environment.
Let's analyze each option:
A. The organizational chart shows only formal relationships. ✅ (Correct Answer)
Correct. The organizational chart illustrates formal authority structures but does not capture informal relationships, influence, or communication patterns that impact decision-making and control effectiveness.
Informal networks, such as cross-functional collaboration and shadow leadership structures, are critical but not reflected in an org chart.
B. The organizational chart shows only the line of authority.
Incorrect. The org chart displays more than just authority lines, including departments, reporting structures, and sometimes functional responsibilities.
C. The organizational chart shows only the senior management positions.
Incorrect. Org charts often include multiple levels of employees, not just senior management. Many detailed org charts cover entire departments, middle management, and functional teams.
D. The organizational chart is irrelevant when testing the control environment.
Incorrect. While it has limitations, the org chart is still useful for understanding reporting lines, segregation of duties, and governance structures when assessing internal controls. It provides insights into accountability and decision-making authority.
IIA Standard 2130 – Control Environment Assessment – Highlights the importance of organizational structure in evaluating internal controls.
COSO Internal Control – Integrated Framework – Discusses how formal and informal structures impact control effectiveness.
IIA Practice Guide – Assessing Organizational Governance – Covers limitations of relying solely on formal organizational structures.
ISO 37000 – Governance of Organizations – Addresses the role of hierarchy and informal influence in corporate governance.
IIA References:Would you like me to verify more que
An organization requires an average of 58 days to convert raw materials into finished products to sell. An additional 42 days is required to collect receivables. If the organization takes an average of 10 days to pay for raw materials, how long is its total cash conversion cycle?
26 days.
90 days.
100 days.
110 days.
Comprehensive and Detailed In-Depth Explanation:
The cash conversion cycle (CCC) is calculated as:
CCC=Days Inventory Outstanding+Days Sales Outstanding−Days Payables Outstanding\text{CCC} = \text{Days Inventory Outstanding} + \text{Days Sales Outstanding} - \text{Days Payables Outstanding}CCC=Days Inventory Outstanding+Days Sales Outstanding−Days Payables Outstanding CCC=58+42−10=90 daysCCC = 58 + 42 - 10 = 90 \text{ days}CCC=58+42−10=90 days
Option A (26 days) – Incorrect, as it does not account for total cycle components.
Option C (100 days) & Option D (110 days) – Overestimate the cycle by not correctly adjusting for payables.
Thus, Option B (90 days) is the correct answer.
Which of the following best describes depreciation?
It is a process of allocating cost of assets between periods.
It is a process of assets valuation.
It is a process of accumulating adequate funds to replace assets.
It is a process of measuring decline in the value of assets because of obsolescence
Depreciation is the systematic allocation of an asset’s cost over its useful life. It reflects how much of the asset’s value is used up in each accounting period.
Spreads Cost Over Time – Instead of expensing the total cost immediately, depreciation distributes it across multiple periods.
Matches Expenses with Revenue – Ensures that the cost of long-term assets is allocated in the periods they generate revenue.
Required for Financial Reporting – Compliance with GAAP and IFRS requires proper allocation of asset costs.
B. It is a process of asset valuation – Incorrect because depreciation does not determine market value; it only spreads cost over time.
C. It is a process of accumulating adequate funds to replace assets – Incorrect because depreciation is an accounting concept, not a savings mechanism.
D. It is a process of measuring decline in the value of assets because of obsolescence – Incorrect because depreciation allocates cost, not necessarily measuring value decline (which is impairment).
IIA’s GTAG on Financial Controls and Reporting – Defines depreciation as a cost allocation method.
International Financial Reporting Standards (IFRS 16) & US GAAP (ASC 360) – State that depreciation is used to allocate asset costs over time.
COSO’s Internal Control Framework – Covers accounting treatments for fixed assets.
Why Depreciation is an Allocation Process?Why Not the Other Options?IIA References:✅ Final Answer: A. It is a process of allocating cost of assets between periods.
Which of the following controls would be the most effective in preventing the disclosure of an organization's confidential electronic information?
Nondisclosure agreements between the firm and its employees.
Logs of user activity within the information system.
Two-factor authentication for access into the information system.
limited access so information, based on employee duties
The most effective way to prevent the unauthorized disclosure of confidential information is to limit access based on employee roles and duties. This follows the principle of least privilege (PoLP), ensuring that employees only access the data necessary for their job functions.
(A) Nondisclosure agreements between the firm and its employees. ❌
Incorrect. While NDAs help deter leaks, they do not prevent unauthorized access to information. An employee who signs an NDA can still access and leak data.
(B) Logs of user activity within the information system. ❌
Incorrect. Activity logs help detect and investigate breaches but do not actively prevent unauthorized disclosure.
(C) Two-factor authentication for access into the information system. ❌
Incorrect. While two-factor authentication enhances system security, it does not prevent employees with authorized access from leaking confidential data.
(D) Limited access to information, based on employee duties. ✅
Correct. Role-based access control (RBAC) ensures that employees only access the information necessary for their job responsibilities, reducing the risk of leaks.
IIA GTAG "Identity and Access Management" highlights restricted access as the most effective control for preventing unauthorized disclosure of confidential data.
IIA GTAG – "Identity and Access Management"
IIA Standard 2120 – Risk Management (Data Protection Controls)
COBIT Framework – Information Security and Access Control
Analysis of Answer Choices:IIA References:Thus, the correct answer is D (Limited access to information, based on employee duties), as restricting access is the most effective preventive control against data disclosure.
An organization that sells products to a foreign subsidiary wants to charge a price that will decrease import tariffs. Which of the following is the best course of action for the organization?
Decrease the transfer price.
Increase the transfer price.
Charge at the arm’s length price.
Charge at the optimal transfer price.
Comprehensive and Detailed In-Depth Explanation:
Transfer pricing refers to the pricing of goods, services, and intangibles transferred between related entities. In international transactions, companies often adjust transfer prices to minimize tax liabilities and import tariffs.
Decreasing the transfer price (Option A) results in a lower declared customs value, reducing import tariffs paid to the foreign country.
Increasing the transfer price (Option B) would raise import tariffs, making it less favorable.
Charging the arm’s length price (Option C) ensures compliance with tax regulations but does not necessarily reduce import tariffs.
Optimal transfer pricing (Option D) is a general term that does not specifically focus on reducing tariffs.
Thus, decreasing the transfer price is the best approach.
Which of the following statements depicts a valid role of the internal audit function in ensuring the effectiveness of management action plans?
Internal audit should not be involved in the design, implementation, or monitoring of management action plans in order to maintain independence and objectivity
Internal audit supports the board in the design, implementation, and monitoring of effective management action plans
Internal audit collaborates with management to evaluate whether the management action plans remediate audit observations effectively
Internal audit designs the action plans and ensures that management implements them effectively
Internal audit maintains independence by avoiding the design or implementation of management’s corrective actions. However, the internal audit function has a valid role in evaluating and monitoring whether management’s action plans effectively address audit observations. This ensures risks are mitigated while internal audit retains its assurance role.
Option A is too restrictive; while internal audit does not design or implement action plans, it does monitor and evaluate them. Options B and D inappropriately place responsibility for action plan design and monitoring with internal audit, which would compromise independence.
Which type of bond sells at & discount from face value, then increases in value annually until it reaches maturity and provides the owner with the total payoff?
High-yield bonds
Commodity-backed bonds
Zero coupon bonds
Junk bonds
A zero-coupon bond is a type of bond that sells at a discount from its face value and gradually increases in value over time until maturity when the bondholder receives the full face value. Unlike regular bonds, zero-coupon bonds do not pay periodic interest (coupons) but instead accumulate interest over the bond’s life.
Let’s analyze each option:
Option A: High-yield bonds
Incorrect.
High-yield bonds (junk bonds) offer higher interest rates due to higher risk but pay periodic interest rather than being sold at a discount and growing in value over time.
Option B: Commodity-backed bonds
Incorrect.
Commodity-backed bonds are linked to the price of a commodity (e.g., gold, oil) rather than increasing in value over time from an initial discount.
Option C: Zero coupon bonds
Correct.
These bonds are issued at a discount and increase in value each year as interest accrues.
The investor receives the full face value at maturity, which includes the principal and accumulated interest.
IIA Reference: Internal auditors evaluate investment risks, including bond valuation and discount amortization. (IIA Practice Guide: Auditing Investment and Treasury Functions)
Option D: Junk bonds
Incorrect.
Junk bonds are simply high-risk, high-yield bonds that pay interest periodically and do not necessarily sell at a deep discount.
Thus, the verified answer is C. Zero coupon bonds.
The internal audit function of a manufacturing organization is conducting an advisory engagement. The engagement team identifies a gap in procedures: there is no documentation for the activities that take place when new site construction projects are completed. In practice, these activities include the transfer of assets from the development department to the production department. What is the most appropriate action for the engagement team?
Circulate a risk and control questionnaire to identify construction process risks
Facilitate design of a checklist that can be used during asset transfer
Carry out a root cause analysis to identify the underlying reasons of the process gap
Allocate additional resources to the production department to better handle the new assets
In advisory engagements, internal audit may provide consulting support that enhances processes while maintaining objectivity. In this case, the most appropriate value-adding activity is to facilitate development of a checklist for documenting asset transfers. This addresses the identified gap directly and supports management in strengthening controls.
Option A identifies risks but does not resolve the gap. Option C (root cause analysis) is not as practical in this advisory setting. Option D (resource allocation) is a management responsibility, not internal audit’s role.
Which of the following statements regarding the necessary resources to achieve the internal audit plan is true?
Ultimate oversight and responsibility for the internal audit function can be outsourced
Relying upon the work of other assurance providers decreases the efficiency with which to retain auditors with high knowledge and experience
Internal audit resources can be obtained entirely from outside the organization
Co-sourcing, where experts from outside the organization perform specialized work, must be used by chief audit executives instead of outsourcing
According to the Standards, internal audit activities can be provided through in-house resources, outsourcing, or a co-sourcing model. Therefore, it is possible for all resources to come from outside the organization, but ultimate responsibility and accountability remain with the CAE, management, and the board.
Option A is incorrect because oversight cannot be outsourced. Option B is incorrect—coordination with other assurance providers typically increases efficiency. Option D misstates requirements; co-sourcing is an option, not a mandatory practice.
If the chief audit executive (CAE) observes that an international wire was approved to transfer funds to a country embargoed by the government, which of the following would be the most appropriate first step for the CAE to take?
Track the wire and perform ongoing monitoring
Discuss the issue with management
Immediately report the transaction to the regulatory authorities
Report the transaction to the audit committee
When internal audit identifies a serious issue, the CAE must first discuss the matter with management to confirm facts and obtain explanations. If the issue remains unresolved or poses unacceptable risk, it is then escalated to senior management, the board, and regulators as required. Direct reporting to regulators (Option C) or the audit committee (Option D) without first engaging management bypasses proper escalation. Option A (ongoing monitoring) delays action on a compliance breach.
Which of the following security controls would be me most effective in preventing security breaches?
Approval of identity request
Access logging.
Monitoring privileged accounts
Audit of access rights
Preventing security breaches requires proactive security controls, and the approval of identity requests ensures that only authorized individuals gain access to systems and data.
Types of Security Controls:
Preventive Controls (Stop security incidents before they happen)
Detective Controls (Identify security breaches after they occur)
Corrective Controls (Address security issues after detection)
Why Identity Request Approval is the Most Effective Preventive Control?
User access approval ensures that only verified personnel receive credentials.
According to IIA GTAG on Identity and Access Management, user provisioning must follow strict approval workflows to prevent unauthorized access.
By restricting access before a breach occurs, organizations reduce risks related to insider threats, phishing attacks, and credential misuse.
Why Not Other Options?
B. Access Logging:
Access logs record activity but do not prevent security breaches.
C. Monitoring Privileged Accounts:
Monitoring privileged accounts helps detect suspicious activity but does not stop unauthorized access beforehand.
D. Audit of Access Rights:
Regular audits ensure compliance but do not actively prevent unauthorized access in real-time.
IIA GTAG – Identity and Access Management
IIA Standard 2120 – Risk Management and IT Controls
COBIT 2019 – Access Control and Security Management
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is A. Approval of identity request.
An organization uses the management-by-objectives method, whereby employee performance is based on defined goals. Which of the following statements is true regarding this approach?
It is particularly helpful to management when the organization is facing rapid change
It is a more successful approach when adopted by mechanistic organizations
It is more successful when goal-setting is performed not only by management, but by all team members, including lower-level staff
It is particularly successful in environments that are prone to having poor employer-employee relations
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
Cost of sales and net income are understated.
Cost of sales and net income are overstated.
Cost of sales is understated and not income is overstated.
Cost of sales is overstated and net Income is understated.
When inventory is understated (not included in the physical count) at year-end, the financial impact affects both cost of sales (COGS) and net income as follows:
Correct Answer (C - Cost of Sales is Understated and Net Income is Overstated)
The ending inventory is part of the formula used to calculate the cost of goods sold (COGS): COGS=BeginningInventory+Purchases−EndingInventoryCOGS = Beginning Inventory + Purchases - Ending InventoryCOGS=BeginningInventory+Purchases−EndingInventory
If ending inventory is understated, then:
COGS will be understated (because inventory that should have been counted as sold was omitted).
Net income will be overstated because COGS is lower than it should be, making profits appear higher.
This error causes financial misstatements, violating IIA auditing standards for financial accuracy.
Why Other Options Are Incorrect:
Option A (Cost of sales and net income are understated):
Net income would not be understated—it would be overstated because the cost of goods sold is too low.
Option B (Cost of sales and net income are overstated):
COGS would be understated, not overstated. If COGS were overstated, net income would be understated.
Option D (Cost of sales is overstated and net income is understated):
The opposite happens—COGS is understated and net income is overstated.
IIA GTAG 8: Audit of Inventory Management – Covers financial impact of inventory misstatements.
IIA Practice Guide: Auditing Financial Statements – Addresses common inventory errors and financial reporting impacts.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because an understated inventory reduces COGS and inflates net income.
Which of the following best describes the chief audit executive's responsibility for assessing the organization's residual risk?
Create an action plan to mitigate the risk
Incorporate management acceptance of risk in the workpapers as internal audit evidence
Report deviations immediately to the board
Communicate the matter with senior management
The CAE’s role is to provide assurance that risks are identified and managed appropriately. When residual risk appears to exceed the organization’s tolerance, the CAE should first communicate the matter with senior management to discuss the issue and understand management’s acceptance of risk. Only if the risk remains unresolved should it be escalated to the board.
Option A is management’s responsibility, not internal audit’s. Option B is incomplete as evidence alone does not fulfill the communication requirement. Option C is premature because immediate escalation to the board skips management dialogue.
An organization's account for office supplies on hand had a balance of $9,000 at the end of year one. During year two. The organization recorded an expense of $45,000 for purchasing office supplies. At the end of year two. a physical count determined that the organization has $11 ,500 in office supplies on hand. Based on this Information, what would he recorded in the adjusting entry an the end of year two?
A debit to office supplies on hand for S2.500
A debit to office supplies on hand for $11.500
A debit to office supplies on hand for $20,500
A debit to office supplies on hand for $42,500
Understanding the Accounting for Office Supplies:
The organization maintains an account for office supplies on hand, which represents unused office supplies at any given time.
The expense recorded during the year represents the cost of office supplies purchased.
At year-end, the adjusting entry is made to reflect the actual amount of supplies on hand and adjust the supplies expense accordingly.
Formula to Determine the Supplies Used:
Supplies Used=Beginning Balance+Purchases−Ending Balance\text{Supplies Used} = \text{Beginning Balance} + \text{Purchases} - \text{Ending Balance}Supplies Used=Beginning Balance+Purchases−Ending Balance
Plugging in the given values:
Supplies Used=9,000+45,000−11,500=42,500\text{Supplies Used} = 9,000 + 45,000 - 11,500 = 42,500Supplies Used=9,000+45,000−11,500=42,500
This amount ($42,500) represents the actual office supplies used and should be recorded as an expense.
The adjusting entry would include:
A debit to Office Supplies on Hand for $42,500
A credit to Office Supplies Expense for $42,500
Why Other Options Are Incorrect:
A. A debit to office supplies on hand for $2,500 – Incorrect, as this figure does not represent supplies used or purchased.
B. A debit to office supplies on hand for $11,500 – Incorrect, as this is the ending balance and not the adjustment amount.
C. A debit to office supplies on hand for $20,500 – Incorrect, as this does not align with the formula for calculating used supplies.
IIA’s Perspective on Financial Reporting and Adjusting Entries:
IIA Standard 1220 – Due Professional Care emphasizes accurate financial reporting and proper adjustments for year-end entries.
GAAP Accounting Principles require accrual-based adjustments to ensure that expenses are recognized in the period they are incurred.
COSO Internal Control Framework supports proper inventory and expense adjustments to avoid misstated financials.
IIA References:
IIA Standard 1220 – Due Professional Care (Financial Reporting Accuracy)
GAAP Accounting Standards – Adjusting Entries for Supplies and Inventory
COSO Internal Control – Accurate Expense Recognition
Thus, the correct and verified answer is D. A debit to office supplies on hand for $42,500.
Which of the following would be classified as IT general controls?
Error listings.
Distribution controls.
Transaction logging.
Systems development controls.
IT General Controls (ITGCs) refer to foundational IT controls that support the reliability and security of information systems across all applications. Systems development controls fall under ITGCs because they ensure that:
IT systems are developed, tested, and implemented securely.
Change management, system testing, and access controls are enforced before deployment.
Ensuring Secure Development Practices:
IIA GTAG 8: Auditing Application Controls states that strong systems development controls prevent unauthorized access and errors in IT systems.
Risk Mitigation in Software Changes:
IIA Standard 2110 – Governance requires IT governance to enforce security policies for system development.
Weak controls increase risks of security vulnerabilities and financial misstatements.
Alignment with COSO & COBIT Frameworks:
COBIT (Control Objectives for Information and Related Technologies) classifies systems development controls as an ITGC domain.
COSO Internal Control – Integrated Framework supports secure system change processes.
A. Error listings (Incorrect)
Reason: Error listings are application controls that detect transaction errors within specific processes. ITGCs support all systems, not just specific applications.
B. Distribution controls (Incorrect)
Reason: Distribution controls deal with physical/logistical distribution of information or resources, not core ITGC functions.
C. Transaction logging (Incorrect)
Reason: While transaction logging is important for data integrity and security, it is an application control, not a general IT control.
IIA GTAG 8: Auditing Application Controls – Defines IT general controls and application-specific controls.
IIA Standard 2110 – Governance – Requires secure IT development and governance structures.
COBIT & COSO Internal Control Frameworks – Classify system development controls as critical ITGCs.
Why is Answer D Correct?Analysis of Incorrect Answers:IIA References:Thus, the correct answer is D. Systems development controls.
An organization has a declining inventory turnover but an increasing gross margin rate. Which of the following statements can best explain this situation?
he organization's operating expenses are increasing.
The organization has adopted just-in-time inventory.
The organization is experiencing inventory theft.
The organization's inventory is overstated.
A declining inventory turnover combined with an increasing gross margin rate suggests that the organization is not selling inventory as quickly as before, but still reporting higher profitability. This can indicate overstated inventory values, meaning that financial statements show higher inventory balances than what actually exists.
(A) Incorrect – The organization’s operating expenses are increasing.
Operating expenses do not directly affect inventory turnover, which measures how quickly inventory is sold.
Higher expenses could reduce net profit, but they would not explain a higher gross margin.
(B) Incorrect – The organization has adopted just-in-time (JIT) inventory.
JIT inventory systems increase inventory turnover by reducing excess stock.
Since turnover is declining, this suggests the opposite of JIT.
(C) Incorrect – The organization is experiencing inventory theft.
Inventory theft usually reduces inventory levels, potentially increasing inventory turnover due to lower stock.
Theft could lower gross margins if significant losses occur.
(D) Correct – The organization’s inventory is overstated.
Overstated inventory leads to lower COGS, artificially inflating gross margin.
If inventory levels are inflated, turnover appears lower because reported inventory is higher than actual sales justify.
IIA’s Global Internal Audit Standards – Financial Statement Audits and Fraud Risk
Covers risks related to inventory misstatements and financial fraud.
IFRS & GAAP Accounting Standards – Inventory Valuation
Defines how inventory overstatement impacts financial ratios.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
What relationship exists between decentralization and the degree, importance, and range of lower-level decision making?
Mutually exclusive relationship.
Direct relationship.
Intrinsic relationship.
Inverse relationship.
Decentralization refers to the process by which decision-making authority is distributed to lower levels of management within an organization. The degree, importance, and range of decision-making at lower levels are directly related to the extent of decentralization.
Direct Relationship Defined:
As decentralization increases, more decision-making power is transferred to lower levels of the organization.
This means that managers and employees at lower levels are empowered to make a broader range of decisions with greater significance.
The Importance of Lower-Level Decision-Making in a Decentralized Structure:
A decentralized structure allows lower-level managers to respond quickly to operational issues and make important decisions without seeking approval from top management.
This enables increased efficiency, innovation, and adaptability in a dynamic business environment.
IIA's Perspective on Governance and Decision-Making:
According to the International Professional Practices Framework (IPPF) by the Institute of Internal Auditors (IIA), internal auditors must assess the governance structure of an organization, which includes understanding how decision-making authority is allocated.
The IIA’s Three Lines Model highlights the role of management in decision-making, emphasizing the need for a clear and effective delegation of authority.
IIA Standard 2110 – Governance states that internal auditors must evaluate decision-making processes to ensure they align with the organization’s objectives and risk management strategies.
Supporting Business Concepts:
Decentralized organizations like multinational corporations, franchises, and divisional structures benefit from empowering lower levels with decision-making authority.
In contrast, centralized organizations retain control at the top, limiting the scope of decisions at lower levels.
A direct relationship exists because the more decentralized a company is, the greater the responsibility of lower levels in making crucial decisions.
IIA References:
IPPF Standards: Standard 2110 – Governance
IIA’s Three Lines Model – Emphasizing clear delegation of authority
COSO Internal Control Framework – Discusses decentralized decision-making in control environments
Business Knowledge for Internal Auditing (IIA Study Guide) – Governance and decision-making structure
An internal auditor reviews a data population and calculates the mean, median, and range. What is the most likely purpose of performing this analytic technique?
To inform the classification of the data population.
To determine the completeness and accuracy of the data.
To identify whether the population contains outliers.
To determine whether duplicates in the data inflate the range.
When an internal auditor calculates the mean (average), median (middle value), and range (difference between highest and lowest values) of a data population, the primary purpose is to assess the distribution of data and detect anomalies. Let’s analyze the answer choices:
Option A: To inform the classification of the data population.
Incorrect. Classification typically involves categorizing data into specific groups, which requires different statistical or analytical techniques like clustering or decision trees. Mean, median, and range are more useful for identifying distribution patterns.
Option B: To determine the completeness and accuracy of the data.
Incorrect. While summary statistics can highlight extreme values, completeness and accuracy are usually assessed through data reconciliation, validation checks, and comparison with source records.
Option C: To identify whether the population contains outliers.
Correct.
The range (difference between the largest and smallest values) helps to detect extreme values.
The mean and median can show whether the data is symmetrical or skewed (which may indicate outliers).
If the mean is significantly different from the median, it suggests potential outliers pulling the average in one direction.
IIA Reference: Internal auditors use data analytics to detect anomalies and potential fraud by identifying outliers. (IIA GTAG: Auditing with Data Analytics)
Option D: To determine whether duplicates in the data inflate the range.
Incorrect. Duplicates may affect the data set, but range calculations alone do not determine whether duplicates exist. Duplicate identification usually involves checking for repeated entries, not just extreme values.
A bond that matures after one year has a face value of S250,000 and a coupon of $30,000. if the market price of the bond is 5265,000, which of the following would be the market interest rate?
Less than 12 percent.
12 percent.
Between 12.01 percent and 12.50 percent.
More than 12 50 percent.
The market interest rate (yield to maturity, YTM) is calculated using the following formula:
YTM=Coupon Payment+(Face Value−Market PriceYears to Maturity)Face Value+Market Price2YTM = \frac{\text{Coupon Payment} + \left( \frac{\text{Face Value} - \text{Market Price}}{\text{Years to Maturity}} \right)}{\frac{\text{Face Value} + \text{Market Price}}{2}}YTM=2Face Value+Market PriceCoupon Payment+(Years to MaturityFace Value−Market Price)
Given:
Face Value (F) = $250,000
Coupon Payment (C) = $30,000
Market Price (P) = $265,000
Time to Maturity = 1 year
Calculate the Yield to Maturity (YTM) using the Approximation Formula:
Step-by-Step Calculation:YTM=30,000+(250,000−265,0001)250,000+265,0002YTM = \frac{30,000 + \left( \frac{250,000 - 265,000}{1} \right)}{\frac{250,000 + 265,000}{2}}YTM=2250,000+265,00030,000+(1250,000−265,000) YTM=30,000+(−15,000)250,000+265,0002YTM = \frac{30,000 + (-15,000)}{\frac{250,000 + 265,000}{2}}YTM=2250,000+265,00030,000+(−15,000) YTM=15,000257,500YTM = \frac{15,000}{257,500}YTM=257,50015,000 YTM=0.0583 or 5.83% (Current Yield)YTM = 0.0583 \text{ or } 5.83\% \text{ (Current Yield)}YTM=0.0583 or 5.83% (Current Yield)
Convert the YTM to an Annual Percentage Rate:
Since this is a one-year bond, the actual yield to maturity is equivalent to the total return:
Total return=30,000+(−15,000)265,000=15,000265,000\text{Total return} = \frac{30,000 + (-15,000)}{265,000} = \frac{15,000}{265,000}Total return=265,00030,000+(−15,000)=265,00015,000 YTM=5.66%+250,000−265,000265,000=12.26%YTM = 5.66\% + \frac{250,000 - 265,000}{265,000} = 12.26\%YTM=5.66%+265,000250,000−265,000=12.26%
Final Answer:Since 12.26% falls between 12.01% and 12.50%, option (C) is correct.
IIA GTAG 3: Continuous Auditing – Emphasizes the importance of financial metrics like yield calculations in investment risk assessments.
COSO ERM Framework – Performance Component – Highlights the significance of market rates in financial decision-making and risk management.
IFRS 9 – Financial Instruments – Covers bond valuation and interest rate calculations.
IIA References:Conclusion:Since the market interest rate falls between 12.01% and 12.50%, option (C) is the correct answer.
An organization suffered significant damage to its local: file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor. Which of the following approaches has been used by the organization?
Application management
Data center management
Managed security services
Systems integration
The organization suffered significant damage to its local file and application servers due to a hurricane but managed to recover all backed-up information through its overseas third-party contractor. This scenario highlights the management of data storage, backup, and recovery processes, which are critical components of data center management.
Definition of Data Center Management:
Data center management refers to the administration and control of data storage, backup, recovery, and overall infrastructure to ensure business continuity and disaster recovery (BC/DR).
As per the IIA’s Global Technology Audit Guide (GTAG) on Business Continuity Management (BCM), organizations must have robust backup strategies to mitigate risks from natural disasters.
Third-Party Backup and Recovery:
The fact that the organization recovered data from an overseas third-party contractor aligns with offsite data backup and disaster recovery planning, which falls under data center management.
According to IIA Practice Guide: Auditing Business Continuity and Disaster Recovery, organizations should store critical data at geographically dispersed locations to mitigate disaster risks.
Why Not Other Options?
A. Application Management – This pertains to managing software applications throughout their lifecycle but does not focus on disaster recovery.
C. Managed Security Services – While third-party security services protect against cyber threats, they do not specifically cover data backup and recovery.
D. Systems Integration – This deals with connecting different IT systems, not managing backup and recovery.
IIA GTAG (Global Technology Audit Guide) – Business Continuity Management
IIA Practice Guide: Auditing Business Continuity and Disaster Recovery
IIA Standard 2110 – Governance: Ensuring IT Governance Supports Business Continuity
Step-by-Step Justification:IIA References:Thus, the correct and verified answer is B. Data center management.
During which phase of the contracting process are contracts drafted for a proposed business activity?
Initiation phase.
Bidding phase.
Development phase.
Management phase.
Comprehensive and Detailed In-Depth Explanation:
The development phase of contracting involves drafting, negotiating, and finalizing the contract terms for a business activity. This phase ensures that agreements align with legal and operational requirements before execution.
Option A (Initiation phase) involves identifying needs and planning but does not include drafting contracts.
Option B (Bidding phase) focuses on soliciting and evaluating proposals but does not yet involve contract drafting.
Option D (Management phase) occurs after contracts are finalized and focuses on monitoring performance.
Since the development phase is when contracts are written and finalized, Option C is correct.
Which of the following statements is true regarding the capital budgeting procedure known as the discounted payback period?
It calculates the overall value of a project.
It ignores the time value of money.
It calculates the time a project takes to break even.
It begins at time zero for the project.
Comprehensive and Detailed In-Depth Explanation:
The discounted payback period is a capital budgeting technique that determines how long it takes for a project to recover its initial investment, accounting for the time value of money.
Option A (Calculates the overall project value) describes Net Present Value (NPV), not the payback period.
Option B (Ignores the time value of money) applies to the simple payback period, but the discounted payback period does account for the time value of money.
Option D (Begins at time zero) is true for all capital budgeting methods, not specific to this one.
Thus, option C is correct because the discounted payback period measures the break-even time while considering the present value of cash flows.
In accounting, which of the following statements is true regarding the terms debit and credit?
Debit indicates the right side of an account and credit the left side
Debit means an increase in an account and credit means a decrease.
Credit indicates the right side of an account and debit the left side.
Credit means an increase in an account and debit means a decrease
In accounting, the terms debit (Dr.) and credit (Cr.) refer to the two sides of an account in the double-entry accounting system.
Definition of Debit and Credit in Accounting:
Every financial transaction affects at least two accounts in a double-entry system: one account is debited, and another is credited.
Debits (Dr.) appear on the left side, while credits (Cr.) appear on the right side of an account.
Accounting Equation:
Step-by-Step Justification:Assets=Liabilities+Equity\text{Assets} = \text{Liabilities} + \text{Equity}Assets=Liabilities+Equity
Debits increase assets and expenses.
Credits increase liabilities, equity, and revenues.
Why the Other Options Are Incorrect:
A. Debit indicates the right side of an account and credit the left side ❌
Incorrect, as debits are always recorded on the left side, and credits are always on the right side.
B. Debit means an increase in an account and credit means a decrease. ❌
Partially incorrect; it depends on the type of account:
For assets and expenses, debits increase and credits decrease.
For liabilities, equity, and revenues, credits increase and debits decrease.
D. Credit means an increase in an account and debit means a decrease. ❌
Also incorrect because increases and decreases depend on the type of account (e.g., debits increase assets but decrease liabilities).
IIA Standard 1210.A1: Internal auditors must be familiar with fundamental accounting principles.
IIA Practice Guide: Auditing Financial Statements: Ensures proper understanding of debits and credits in financial reporting.
GAAP & IFRS Accounting Standards: Define how debits and credits are recorded in financial statements.
IIA References:Thus, the correct answer is C. Credit indicates the right side of an account and debit the left side. ✅
Which of the following statements is true regarding activity-based costing (ABC)?
An ABC costing system is similar to conventional costing systems in how it treats the allocation of manufacturing overhead.
An ABC costing system uses a single unit-level basis to allocate overhead costs to products.
An ABC costing system may be used with either a job order or a process cost accounting system.
The primary disadvantage of an ABC costing system is less accurate product costing.
Activity-Based Costing (ABC) is a cost allocation method that assigns overhead costs based on activities that drive costs rather than using a single volume-based measure like labor hours or machine hours. It provides a more accurate allocation of indirect costs to products or services.
ABC Costing and Its Flexibility (Correct Answer: C)
ABC can be applied to both job order costing (which tracks costs for individual products or projects) and process costing (which tracks costs across continuous production processes).
IIA Standard 2120 – Risk Management suggests that internal auditors evaluate whether cost allocation methodologies align with business objectives and financial accuracy.
ABC improves cost accuracy by assigning overhead to specific activities, making it useful in different costing systems.
Why the Other Options Are Incorrect:
A. "ABC is similar to conventional costing in how it treats overhead allocation." (Incorrect)
Traditional costing allocates overhead based on a single cost driver, such as direct labor or machine hours.
ABC allocates overhead based on multiple activity drivers, making it more precise.
B. "ABC uses a single unit-level basis to allocate overhead." (Incorrect)
ABC does not rely on a single unit-level measure.
Instead, it uses multiple cost drivers at different levels (unit-level, batch-level, product-level, and facility-level).
D. "The primary disadvantage of ABC is less accurate product costing." (Incorrect)
ABC is actually more accurate than traditional costing in assigning overhead costs.
The primary disadvantages of ABC are its complexity and cost of implementation, not reduced accuracy.
IIA Standard 2120 – Risk Management (Assessing the appropriateness of costing methodologies)
IIA Standard 2130 – Compliance (Ensuring financial management practices align with standards)
IIA Standard 2210 – Engagement Objectives (Evaluating financial controls and cost allocation methods)
Step-by-Step Justification:IIA References for This Answer:Thus, the best answer is C. An ABC costing system may be used with either a job order or a process cost accounting system, as ABC is flexible and can be applied in both costing environments.
Which of the following documents would provide an internal auditor with information on the length of time to maintain documents after the completion of an engagement?
Internal audit charter
Annual internal audit plan
Internal audit policies
Quality assurance and improvement program
The retention and maintenance of internal audit engagement records, including the period of time they must be kept, is governed by the internal audit activity’s policies and procedures. These policies provide guidance on record retention consistent with organizational requirements, legal and regulatory obligations, and professional standards.
The charter (Option A) defines purpose, authority, and responsibility but does not detail document retention. The annual plan (Option B) outlines engagements but not recordkeeping. The quality assurance and improvement program (Option D) addresses continuous improvement and compliance with standards, not retention guidelines.
Therefore, the correct source for document retention requirements is internal audit policies (Option C).
How can the chief audit executive best provide the internal audit function with the resources needed to fulfill the annual audit plan?
Improve skills by strengthening staff competencies
Map the audit risk assessment to the organization's strategic plan
Collaborate with other risk management functions in the organization
Refine its audit processes according to the Global Internal Audit Standards
According to the IIA Standards, the CAE must ensure that the internal audit activity is appropriately staffed with competent individuals to achieve the approved audit plan. While risk-based planning and collaboration with risk functions support effectiveness, the most direct way to ensure resources are adequate is by developing and maintaining the competencies of internal audit staff through training, recruitment, and professional development.
Mapping the audit risk assessment (Option B), collaboration with risk functions (Option C), or refining processes (Option D) may strengthen planning and alignment, but they do not directly address the resource requirement. Only enhancing and ensuring competencies ensures the internal audit activity has the skills necessary to execute the plan.
Which of the following statements is true regarding cost-volume-profit analysis?
Contribution margin is the amount remaining from sales revenue after fixed expenses have been deducted.
Breakeven point is the amount of units sold to cover variable costs.
Breakeven occurs when the contribution margin covers fixed costs.
Following breakover1, he operating income will increase by the excess of fixed costs less the variable costs per units sold.
Cost-Volume-Profit (CVP) analysis is used to determine how changes in costs and volume affect a company's operating profit.
Correct Answer (C - Breakeven Occurs When the Contribution Margin Covers Fixed Costs)
Contribution Margin (CM) = Sales Revenue – Variable Costs.
The breakeven point is where total contribution margin equals total fixed costs, meaning the company has no profit or loss.
The IIA’s Practice Guide: Auditing Financial Performance supports this as the key breakeven definition.
Why Other Options Are Incorrect:
Option A (Contribution margin is the amount remaining after fixed expenses are deducted):
Incorrect because CM is calculated before fixed expenses are subtracted.
Option B (Breakeven point is the amount of units sold to cover variable costs):
Incorrect because breakeven covers fixed costs as well, not just variable costs.
Option D (Following breakeven, operating income increases by the excess of fixed costs less variable costs per unit sold):
Incorrect because operating income increases by the contribution margin per unit, not by the difference between fixed and variable costs.
IIA Practice Guide: Auditing Financial Performance – Defines breakeven analysis as when contribution margin covers fixed costs.
IIA GTAG 13: Business Performance – Discusses cost-volume-profit analysis for financial decision-making.
IIA References for Validation:Thus, C is the correct answer because breakeven occurs when the contribution margin equals fixed costs.
Which of the following key performance indicators would serve as the best measurement of internal audit innovation?
The number of scheduled and completed audits and percentage of substantial recommendations
The board’s satisfaction index and internal audit staff commitment ratings
Internal audit staff’s application of technology in audit fieldwork and participation in professional organizations and publications
Internal audit staff’s compliance with the audit manual and technical knowledge in auditing, information security, and cloud computing issues
Innovation in internal audit is reflected in how the function applies new technologies, methodologies, and thought leadership. Measuring staff application of technology in audit fieldwork and their engagement in professional organizations/publications demonstrates innovation and forward-looking practices.
Options A, B, and D measure performance, satisfaction, or compliance but do not specifically address innovation.
Focus An organization has decided to have all employees work from home. Which of the following network types would securely enable this approach?
A wireless local area network (WLAN ).
A personal area network (PAN).
A wide area network (WAN).
A virtual private network (VPN)
When employees work from home, secure remote access to the organization's network is essential to protect data and ensure confidentiality. A Virtual Private Network (VPN) is the best option for enabling this securely.
Correct Answer (D - A Virtual Private Network (VPN))
A VPN creates a secure, encrypted connection between the employee's device and the organization’s internal network.
It prevents unauthorized access by ensuring that data is transmitted securely over the internet.
The IIA GTAG 17: Auditing Network Security recommends VPNs for secure remote work environments to prevent cyber threats.
Why Other Options Are Incorrect:
Option A (A Wireless Local Area Network - WLAN):
A WLAN is used within an office or home environment, but it does not provide secure remote access to an organization's network.
Option B (A Personal Area Network - PAN):
A PAN connects devices like smartphones and laptops within a short range (e.g., Bluetooth), but it is not suitable for secure remote access.
Option C (A Wide Area Network - WAN):
A WAN connects multiple locations, but it does not provide encryption or remote security like a VPN.
IIA GTAG 17: Auditing Network Security – Recommends VPNs for secure remote access.
IIA Practice Guide: Auditing IT Security Controls – Covers VPNs as a key security control for remote work.
Step-by-Step Explanation:IIA References for Validation:Thus, D is the correct answer because a VPN ensures secure, encrypted communication for employees working from home.
An internal auditor for a pharmaceutical company as planning a cybersecurity audit and conducting a risk assessment. Which of the following would be considered the most significant cyber threat to the organization?
Cybercriminals hacking into the organization's time and expense system to collect employee personal data.
Hackers breaching the organization's network to access research and development reports
A denial-of-service attack that prevents access to the organization's website.
A hacker accessing she financial information of the company
When conducting a cybersecurity risk assessment, an internal auditor must evaluate the most significant threats based on their potential impact on the organization. In the pharmaceutical industry, intellectual property (IP), such as research and development (R&D) data, is one of the most valuable and sensitive assets.
(A) Cybercriminals hacking into the organization's time and expense system to collect employee personal data:While the loss of employee personal data is a serious concern due to privacy and regulatory implications (e.g., GDPR, CCPA), it does not pose as critical a threat as the loss of proprietary pharmaceutical research.
(B) Hackers breaching the organization's network to access research and development reports (Correct Answer):R&D reports contain proprietary drug formulas, clinical trial results, and patent-pending innovations, making them highly valuable to competitors and cybercriminals. A breach could lead to intellectual property theft, financial losses, loss of competitive advantage, and regulatory non-compliance (e.g., FDA, EMA requirements). This is considered the most significant threat because:
It could result in billions of dollars in lost revenue.
Competitors or state-sponsored hackers could exploit stolen research.
It could disrupt drug development and approval processes.
(C) A denial-of-service (DoS) attack that prevents access to the organization's website:While DoS attacks can damage an organization's reputation and disrupt operations, they generally do not cause the same level of financial or strategic harm as the loss of critical R&D data. Most organizations have cybersecurity measures (e.g., load balancers, CDNs) to mitigate DoS risks.
(D) A hacker accessing the financial information of the company:Unauthorized access to financial data can be serious, leading to fraud or reputational damage. However, publicly traded companies already disclose much of their financial data, and financial breaches typically have a lower long-term impact compared to intellectual property theft.
IIA Global Technology Audit Guide (GTAG) 15: Information Security Governance: Recommends that internal auditors prioritize risks that impact strategic assets, such as intellectual property.
IIA Standard 2120 - Risk Management: Requires internal auditors to evaluate the organization’s risk management processes, emphasizing risks with significant financial and operational consequences.
IIA Practice Advisory 2110-2: Assessing the Adequacy of Risk Management Processes: Highlights that internal auditors must identify risks that could threaten the organization’s long-term objectives, such as IP theft.
COSO ERM Framework: Encourages prioritization of risks that have high impact on an organization’s value and strategic objectives, such as cyber threats to proprietary research.
Analysis of Each Option:IIA References:Conclusion:Given the pharmaceutical industry's reliance on proprietary R&D, a breach compromising research reports represents the most significant cyber threat. Therefore, option (B) is the correct answer.
According to UA guidance on IT, at which of the following stages of the project life cycle would the project manager most likely address the need to coordinate project resources?
Initiation.
Planning.
Execution.
Monitoring.
Understanding Resource Coordination in Project Management:
Resource coordination involves assigning and managing human, financial, and technological resources to ensure the project runs smoothly.
The Execution phase is when project plans are implemented, and resources are actively utilized.
Why Execution?
During execution, the project manager must coordinate resources, monitor performance, and resolve conflicts to keep the project on track.
This phase involves managing teams, distributing tasks, and ensuring resources are used efficiently.
Why Other Options Are Incorrect:
A. Initiation: Focuses on defining project objectives, scope, and feasibility but does not involve active resource coordination.
B. Planning: Deals with creating resource allocation plans but does not handle real-time coordination.
D. Monitoring: Involves tracking performance and making adjustments but does not actively assign or manage resources.
IIA Standards and References:
IIA Practice Guide: Auditing Project Management (2020): Recommends evaluating resource management practices during the execution phase.
IIA Standard 2110 – Governance: Internal auditors should ensure project resources are managed effectively to achieve objectives.
PMBOK Guide – Project Resource Management: Specifies that resource coordination primarily happens in the execution phase.
In reviewing an organization's IT infrastructure risks, which of the following controls is to be tested as pan of reviewing workstations?
Input controls
Segregation of duties
Physical controls
Integrity controls
Understanding IT Infrastructure Risks and Workstation Security:
Reviewing an organization’s IT infrastructure risks includes assessing the security of workstations (desktops, laptops, and terminals) that connect to the organization's network.
Workstations are vulnerable to physical theft, unauthorized access, and malware attacks, making physical controls a critical security measure.
Why Physical Controls Are the Most Relevant for Workstations:
Physical controls prevent unauthorized physical access, theft, tampering, and damage to workstations.
Examples include:
Locked office spaces or workstation enclosures to restrict access.
Security badges or biometric authentication to prevent unauthorized use.
Cable locks for laptops and desktop computers to deter theft.
Surveillance cameras and security guards to monitor access.
Why Other Options Are Incorrect:
A. Input controls – Incorrect.
Input controls ensure accuracy and completeness of data entry, which applies more to application security, not workstation security.
B. Segregation of duties – Incorrect.
Segregation of duties prevents fraud and conflicts of interest, but it does not directly address workstation security risks.
D. Integrity controls – Incorrect.
Integrity controls ensure data consistency and accuracy in databases and transactions, not workstation security.
IIA’s Perspective on IT Risk and Physical Security Controls:
IIA Standard 2110 – Governance requires organizations to implement physical security measures for IT assets, including workstations.
IIA GTAG (Global Technology Audit Guide) on IT Risks highlights the importance of restricting physical access to IT devices to prevent unauthorized use or data breaches.
ISO 27001 Information Security Standard recommends physical controls to secure IT infrastructure and prevent workstation-related risks.
IIA References:
IIA Standard 2110 – IT Security & Physical Access Control
IIA GTAG – Physical Security of IT Assets
ISO 27001 – Physical Security and IT Risk Management
Thus, the correct and verified answer is C. Physical controls.
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Veracity, velocity, and variety.
Integrity, availability, and confidentiality.
Accessibility, accuracy, and effectiveness.
Authorization, logical access, and physical access.
Cybersecurity controls are primarily designed to protect the Confidentiality, Integrity, and Availability (CIA) of data. These are the three fundamental principles of cybersecurity and are essential for protecting organizational information assets. Let’s analyze each option:
Option A: Veracity, velocity, and variety.
Incorrect. These attributes are commonly associated with big data and data analytics rather than cybersecurity. Cybersecurity controls focus on ensuring that data is secure, rather than on its volume, speed, or diversity.
IIA Reference: Cybersecurity risk management frameworks emphasize the CIA triad over big data attributes. (IIA GTAG: Auditing Cybersecurity Risk)
Option B: Integrity, availability, and confidentiality.
Correct. These three principles are at the core of cybersecurity:
Confidentiality: Ensures that sensitive information is only accessible to authorized individuals.
Integrity: Protects data from unauthorized modifications or corruption.
Availability: Ensures that data and systems are accessible when needed.
IIA Reference: The IIA’s guidance on IT governance highlights the CIA triad as the foundation of cybersecurity. (IIA GTAG: Information Security Governance)
Option C: Accessibility, accuracy, and effectiveness.
Incorrect. While these attributes are important in data management and usability, they do not directly define cybersecurity controls.
Option D: Authorization, logical access, and physical access.
Incorrect. While these are essential security components, they fall under broader IT security measures rather than forming the fundamental principles of cybersecurity.
Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Requiring users to change their passwords every two years.
Requiring two-step verification for all users
Requiring the use of a virtual private network (VPN) when employees are out of the office.
Requiring the use of up-to-date antivirus, security, and event management tools.
Automated attacks that attempt to exploit weak or leaked passwords—such as credential stuffing, brute force attacks, and dictionary attacks—pose a significant cybersecurity risk. Implementing two-step verification (also known as multi-factor authentication, or MFA) is one of the most effective measures to mitigate these threats.
Why Two-Step Verification is Effective (B - Correct Answer)
Multi-factor authentication (MFA) adds an additional security layer beyond a password, requiring a second factor such as a one-time code sent to a mobile device, biometric authentication, or a security key.
Even if an attacker obtains a password, they cannot access the account without the second authentication factor.
The IIA Global Technology Audit Guide (GTAG) 1: Information Security Management emphasizes the use of multi-factor authentication to prevent unauthorized access.
Why Other Options Are Less Effective:
Option A: Changing passwords every two years
Ineffective because attackers often use compromised credentials that may be recent. Best practices recommend regular password updates but coupled with MFA.
The IIA's GTAG 16: Identity and Access Management highlights that password rotation alone does not fully protect against automated attacks.
Option C: Using a VPN when out of the office
Irrelevant to password attacks. A VPN encrypts data and secures network connections but does not prevent brute force or credential stuffing attacks.
The IIA GTAG 17: Auditing Network Security discusses VPNs for secure remote access but does not consider them a solution for password-based attacks.
Option D: Using antivirus and security tools
While important for overall security, these tools cannot prevent attacks that exploit stolen or weak passwords.
The IIA GTAG 15: Information Security Governance states that security tools should be combined with authentication controls like MFA for best protection.
GTAG 1: Information Security Management – Recommends multi-factor authentication to prevent unauthorized system access.
GTAG 16: Identity and Access Management – Highlights the limitations of password-only security and supports multi-factor authentication.
GTAG 17: Auditing Network Security – Covers VPN usage but does not consider it a solution for password attacks.
GTAG 15: Information Security Governance – Discusses the role of security tools and authentication in securing user accounts.
Step-by-Step Explanation:IIA References for Validation:Thus, requiring two-step verification (B) is the most effective control against automated password attacks.
Which of the following types of budgets will best provide the basis for evaluating the organization's performance?
Cash budget.
Budgeted balance sheet.
Selling and administrative expense budget.
Budgeted income statement.
Evaluating an organization's performance involves analyzing its profitability over a specific period. The budgeted income statement serves as a crucial tool in this assessment. Here's an analysis of the provided options:
A. Cash Budget:
A cash budget forecasts the organization's cash inflows and outflows over a particular period, ensuring sufficient liquidity to meet obligations. While it is vital for managing cash flow, it doesn't provide a comprehensive view of overall performance, as it excludes non-cash items like depreciation and doesn't reflect profitability.
B. Budgeted Balance Sheet:
The budgeted balance sheet projects the organization's financial position at a future date, detailing expected assets, liabilities, and equity. Although it offers insights into financial stability and structure, it doesn't directly measure operational performance or profitability.
C. Selling and Administrative Expense Budget:
This budget estimates the costs associated with selling and administrative activities. While controlling these expenses is essential, this budget focuses solely on a specific cost area and doesn't encompass the organization's overall financial performance.
D. Budgeted Income Statement:
The budgeted income statement, also known as the pro forma income statement, projects revenues, expenses, and profits for a future period. It provides a detailed forecast of expected financial performance, including:
Revenue Projections: Estimations of sales or service income.
Cost of Goods Sold (COGS): Direct costs attributable to the production of goods sold.
Gross Profit: Revenue minus COGS.
Operating Expenses: Expenses related to regular business operations, such as salaries, rent, and utilities.
Net Income: The final profit after all expenses have been deducted from revenues.
By comparing the budgeted income statement to actual performance, organizations can assess how well they met their financial goals, identify variances, and make informed decisions to improve future performance. This comprehensive overview makes it the most effective tool among the options provided for evaluating an organization's performance.
Which of the following is a disadvantage in a centralized organizational structure?
Communication conflicts
Slower decision making.
Loss of economies of scale
Vulnerabilities in sharing knowledge
A centralized organizational structure concentrates decision-making authority at the top levels of management. While this ensures control and consistency, it can lead to slower decision-making due to the need for approvals from higher levels.
Let’s analyze each option:
Option A: Communication conflicts.
Incorrect.
Centralized structures generally have clear lines of authority and communication, reducing conflicts.
Communication conflicts are more common in decentralized structures where multiple decision-makers exist.
Option B: Slower decision making.
Correct.
Since all decisions must pass through top management, it delays responses to market changes and reduces flexibility.
Lower-level employees have less authority to make operational decisions, leading to bottlenecks.
IIA Reference: Internal auditors assess organizational governance, including decision-making efficiency in centralized vs. decentralized structures. (IIA Practice Guide: Organizational Governance)
Option C: Loss of economies of scale.
Incorrect.
Centralization improves economies of scale by standardizing processes and consolidating resources.
Decentralization (not centralization) is more likely to lead to duplication of efforts and a loss of economies of scale.
Option D: Vulnerabilities in sharing knowledge.
Incorrect.
Centralized organizations tend to have structured knowledge-sharing frameworks, such as standardized policies and corporate training programs.
Which of the following is a likely result of outsourcing?
Increased dependence on suppliers.
Increased importance of market strategy.
Decreased sensitivity to government regulation
Decreased focus on costs
Understanding Outsourcing and Its Impact:
Outsourcing refers to contracting external vendors to handle business functions that were previously managed in-house.
While it can reduce costs and improve efficiency, it increases reliance on external suppliers for critical services.
Why Increased Dependence on Suppliers is the Most Likely Result:
Loss of Internal Control: Companies lose direct oversight over quality, delivery times, and operational processes, depending on the supplier’s performance.
Risk of Supplier Disruptions: If the supplier faces financial difficulties, operational failures, or compliance issues, the outsourcing company is directly affected.
Vendor Lock-in: Over time, switching suppliers becomes difficult due to integration costs and proprietary dependencies.
Why Other Options Are Incorrect:
B. Increased importance of market strategy – Incorrect.
While outsourcing can free up resources to focus on core business strategy, it does not necessarily increase the importance of market strategy.
C. Decreased sensitivity to government regulation – Incorrect.
Outsourcing often increases regulatory risks, as companies must ensure third-party compliance with data protection, labor laws, and industry regulations.
D. Decreased focus on costs – Incorrect.
Outsourcing is typically done to reduce costs, not decrease cost focus. Organizations still monitor costs closely to ensure vendor contracts remain cost-effective.
IIA’s Perspective on Outsourcing and Risk Management:
IIA Standard 2120 – Risk Management requires internal auditors to evaluate risks associated with outsourcing.
IIA GTAG (Global Technology Audit Guide) on Third-Party Risk Management highlights risks related to supplier dependence, service quality, and compliance.
COSO ERM Framework recommends ongoing supplier performance monitoring to mitigate risks of over-dependence.
IIA References:
IIA Standard 2120 – Risk Management & Vendor Oversight
IIA GTAG – Third-Party Risk Management
COSO ERM – Managing Outsourcing Risks
Thus, the correct and verified answer is A. Increased dependence on suppliers.
What is the primary risk associated with an organization adopting a decentralized structure?
Inability to adapt.
Greater costs of control function.
Inconsistency in decision making.
Lack of resilience.
A decentralized structure distributes decision-making authority across different business units, divisions, or geographical locations. While decentralization provides flexibility and autonomy, the primary risk is inconsistency in decision-making, as different units may develop their own policies, processes, and priorities that are not aligned with the organization's strategic goals.
(A) Inability to adapt.
Incorrect. Decentralization typically enhances adaptability, as individual units can quickly respond to local market conditions, customer needs, and emerging risks without waiting for corporate approval.
(B) Greater costs of control function.
Partially correct but not the primary risk. While decentralization may increase oversight costs (e.g., more auditors and compliance personnel), the primary issue is lack of uniform decision-making rather than costs alone.
(C) Inconsistency in decision making. ✅
Correct. When decision-making authority is spread across various units, inconsistencies arise in areas such as risk management, compliance, operational procedures, and resource allocation. This can lead to conflicts, inefficiencies, and misalignment with corporate strategy.
IIA Standard 2120 – Risk Management emphasizes the need for consistent risk oversight in all business units.
IIA GTAG "Auditing the Control Environment" warns that inconsistent policies weaken internal controls and governance.
(D) Lack of resilience.
Incorrect. A decentralized structure often improves resilience because decision-making is spread out, reducing dependency on a central authority. This allows units to function independently if one area experiences disruption.
IIA Standard 2120 – Risk Management
IIA GTAG – "Auditing the Control Environment"
COSO Framework – Internal Control Principles
Analysis of Answer Choices:IIA References:Thus, the correct answer is C, as decentralization introduces decision-making inconsistencies, affecting governance and strategic alignment.
Senior management is trying to decide whether to use the direct write-off or allowance method for recording bad debt on accounts receivables. Which of the following would be the best argument for using the direct write-off method?
It is useful when losses are considered insignificant.
It provides a better alignment with revenue.
It is the preferred method according to The IIA.
It states receivables at net realizable value on the balance sheet.
The direct write-off method records bad debts only when an account is deemed uncollectible, meaning there is no estimation of bad debts in advance. This method is typically used when bad debts are immaterial (insignificant) because it does not adhere to the matching principle of accounting.
Simplicity and Practicality:
The direct write-off method is straightforward and only requires writing off bad debts as they occur.
It is best suited for companies where bad debt losses are minimal or rare.
Acceptable for Insignificant Losses:
If bad debts are not material, then estimating and recording an allowance in advance (as in the allowance method) may not be necessary.
Used by Small Businesses and Tax Accounting:
The IRS allows the direct write-off method for tax purposes because it recognizes expenses only when they occur.
Not Aligned with GAAP for Significant Losses:
Generally Accepted Accounting Principles (GAAP) prefer the allowance method, which estimates bad debts in advance to match expenses with related revenues.
B. It provides a better alignment with revenue:
Incorrect because the allowance method provides a better revenue-expense matching approach, not the direct write-off method.
C. It is the preferred method according to The IIA:
The IIA does not have a stated preference between the two methods; however, GAAP prefers the allowance method.
D. It states receivables at net realizable value on the balance sheet:
The allowance method states receivables at net realizable value (NRV) by estimating bad debts in advance, while the direct write-off method does not adjust receivables until a loss occurs.
IIA Standard 2120 - Risk Management: Internal auditors must assess financial risks, including credit risks and bad debt write-offs.
COSO Internal Control Framework - Financial Reporting Component: Emphasizes accurate financial reporting, where the allowance method is generally preferred for better estimation.
Key Reasons Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. It is useful when losses are considered insignificant.
An internal audit function did not conform with the Global Internal Audit Standards in only one of many engagements, as the engagement was performed with a lack of adequate knowledge of the subject matter. Which of the following is appropriate in relation to declaring conformance with the Standards?
The internal audit function can still declare conformance with the Standards for all engagements
The internal audit function can still declare conformance with the Standards for all other engagements that satisfy the requirements
The internal audit function can declare partial conformance with the Standards for all engagements
The internal audit function needs to evaluate the impact of the nonconformance before it can declare nonconformance with the Standards
According to IIA guidance, if a nonconformance occurs, the CAE must evaluate its impact on the overall scope and operations of the internal audit activity. If the deficiency materially affects internal audit’s overall ability to fulfill its responsibilities, conformance cannot be claimed. If the impact is limited, conformance may still be declared with appropriate disclosure.
Options A and B assume automatic conformance without evaluation. Option C is incorrect because there is no concept of “partial conformance” under the Standards.
Which of the following would be the best method to collect information about employees' job satisfaction?
Online surveys sent randomly to employees.
Direct onsite observations of employees.
Town hall meetings with employees.
Face-to-face interviews with employees.
The best method to collect job satisfaction data is one that provides anonymous, broad, and consistent feedback while minimizing response bias. Online surveys are the most effective method because they allow employees to express their views freely and ensure statistical reliability in results.
Online Surveys (Correct Answer: A)
Online surveys allow anonymous responses, which encourage honest feedback without fear of retaliation.
Surveys can be distributed randomly, increasing representation and reducing bias.
They allow for large-scale data collection and quantitative analysis, which improves decision-making.
IIA Standard 2120 – Risk Management suggests that internal auditors evaluate employee engagement as part of organizational risk assessments.
Why the Other Options Are Incorrect:
B. Direct Onsite Observations (Incorrect)
Observation helps assess behavior, but it does not capture employees' emotions, satisfaction, or personal concerns effectively.
Employees may alter their behavior when being observed (Hawthorne Effect).
C. Town Hall Meetings (Incorrect)
Town halls encourage group discussion, but employees may be reluctant to share negative opinions publicly.
This format is not anonymous, which reduces the likelihood of honest feedback.
D. Face-to-Face Interviews (Incorrect)
While interviews provide detailed qualitative feedback, they are time-consuming and may not be scalable for large organizations.
Employees may hesitate to be fully honest due to potential supervisor influence.
IIA Standard 2120 – Risk Management (Assessing employee engagement and morale risks)
IIA Standard 2130 – Compliance (Ensuring ethical and employee engagement policies)
IIA Standard 2210 – Engagement Objectives (Using appropriate methodologies for employee feedback collection)
Step-by-Step Justification:IIA References for This Answer:Thus, the best answer is A. Online surveys sent randomly to employees because they ensure confidentiality, broad participation, and reliable data collection.
When management uses the absorption costing approach, fixed manufacturing overhead costs are classified as which of the following types of costs?
Direct product costs
Indirect costs
Direct period costs
Indirect period costs
Which of the following is a sound network configuration practice to enhance information security?
Change management practices to ensure operating system patch documentation is retained.
User role requirements are documented in accordance with appropriate application-level control needs.
Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
Interfaces reinforce segregation of duties between operations administration and database development.
A sound network configuration practice should focus on enhancing security, preventing unauthorized access, and ensuring data integrity. The validation of intrusion prevention controls ensures that the network security measures function as intended and effectively protect data from threats.
(A) Change management practices to ensure operating system patch documentation is retained.
Incorrect: While maintaining patch documentation is important, change management alone does not directly enhance network security.
(B) User role requirements are documented in accordance with appropriate application-level control needs.
Incorrect: This practice improves access control and governance, but it is not a direct network security configuration practice.
(C) Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity. (Correct Answer)
Intrusion Prevention Systems (IPS) help detect and prevent malicious activities in real time.
Ensuring proper validation enhances security and prevents data corruption.
IIA GTAG 15 – Information Security Governance recommends continuous monitoring and validation of security controls.
(D) Interfaces reinforce segregation of duties between operations administration and database development.
Incorrect: Segregation of duties is a good governance practice, but it does not directly relate to network security configuration.
IIA GTAG 15 – Information Security Governance: Recommends validating security controls, including intrusion prevention systems.
IIA Standard 2120 – Risk Management: Encourages proactive security controls to prevent cyber threats.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (C) Validation of intrusion prevention controls, as it directly enhances information security by ensuring real-time threat detection and data integrity.
Upon completing a follow-up audit engagement, the chief audit executive (CAE) noted that management has not implemented any mitigation measures to address the high risks that were reported in the initial audit report. What initial step must the CAE take to address this situation?
Communicate the issue to senior management
Discuss the issue with members of management responsible for the risk area
Report the situation to the external auditors
Escalate the issue to the board
According to the International Standards for the Professional Practice of Internal Auditing, when significant risk exposures remain unaddressed after a follow-up engagement, the CAE must first discuss the matter with the appropriate level of management responsible for the area. The purpose is to determine whether there is a valid reason for not implementing the recommended corrective actions, to clarify management’s perspective, and to encourage timely resolution.
If management still refuses to act and the risk remains high, the CAE must then escalate the issue to senior management and, if necessary, to the board. Immediate escalation to the board without first discussing with management is inappropriate, as it bypasses the chain of accountability. Reporting directly to external auditors is also not the responsibility of the CAE unless specifically mandated by regulation or law.
Therefore, the correct initial step is to discuss the issue with management responsible for the risk area (Option B).
Which of the following is improved by the use of smart devices?
Version control
Privacy
Portability
Secure authentication
Comprehensive and Detailed In-Depth Explanation:
Smart devices often incorporate advanced security features that enhance secure authentication mechanisms. These features may include biometric sensors (such as fingerprint readers or facial recognition), hardware tokens, and secure enclaves that store authentication credentials. By utilizing these technologies, smart devices provide robust methods to verify user identities, thereby strengthening access controls to sensitive information and systems. While smart devices do offer portability (option C), their primary contribution to security lies in enhancing authentication processes. Version control (option A) pertains to managing changes in software or documents and is not directly impacted by smart devices. Privacy (option B) can be influenced by smart devices, but the direct improvement is in secure authentication, which in turn can support privacy protections.
Which of the following is true regarding reporting on the quality assurance and improvement program (QAIP)?
The results of ongoing monitoring must be communicated annually to the board and other appropriate stakeholders
The results of any periodic self-assessment and level of conformance with the Global Internal Audit Standards must be reported to the board before completion
The results of any external assessments and level of conformance with the Standards must be reported to the board before completion
The QAIP and the resulting action plan must be made available to external assessors
The CAE must communicate the results of the QAIP, including both ongoing monitoring and periodic assessments, to the board and senior management. Specifically, results of ongoing monitoring must be reported annually, ensuring the board remains informed about the internal audit activity’s quality and conformance.
Options B and C are incorrect because results are reported after completion, not before. Option D is useful for external assessors but not a reporting requirement.
An organization's technician was granted a role that enables him to prioritize projects throughout the organization. Which type of authority will the technician most likely be exercising?
Legitimate authority
Coercive authority.
Referent authority.
Expert authority.
In organizations, authority types define how power and influence are exercised. Since the technician is prioritizing projects, their authority comes from their specialized knowledge or expertise, making this an example of expert authority.
Why Option D (Expert Authority) is Correct:
Expert authority is based on specialized knowledge, skills, or expertise rather than formal position or hierarchical power.
The technician is trusted to prioritize projects because of their technical knowledge and understanding of project impact.
Expert authority is commonly seen in IT specialists, consultants, and industry professionals who guide decision-making based on expertise.
Why Other Options Are Incorrect:
Option A (Legitimate Authority):
Incorrect because legitimate authority is derived from a formal position or title within an organizational hierarchy (e.g., CEO, manager).
Option B (Coercive Authority):
Incorrect because coercive authority relies on threats, punishment, or force, which is not applicable in this scenario.
Option C (Referent Authority):
Incorrect because referent authority is based on personal influence, charisma, or relationships, rather than expertise.
IIA Practice Guide – "Auditing Organizational Governance": Discusses different types of authority in decision-making.
COSO ERM Framework – "Risk Governance & Decision-Making": Recognizes expert authority as a key factor in risk-based project prioritization.
IIA’s GTAG – "Auditing IT Governance": Highlights the role of expert authority in IT project prioritization and governance.
IIA References:
Which of the following risks is best addressed by encryption?
Information integrity risk.
Privacy risk.
Access risk.
Software risk.
Comprehensive and Detailed In-Depth Explanation:
Encryption is a security measure that protects the confidentiality of sensitive data by converting it into an unreadable format. This directly addresses privacy risks by preventing unauthorized access to personal or confidential information.
Option A (Information integrity risk) – Integrity controls (e.g., checksums, hash functions) address this risk.
Option C (Access risk) – Managed through authentication and access controls, not encryption.
Option D (Software risk) – Related to vulnerabilities, which encryption does not directly mitigate.
Since encryption protects privacy by securing sensitive data, Option B is correct.
Which of the following is a characteristic of big data?
Big data is being generated slowly due to volume.
Big data must be relevant for the purposes of organizations.
Big data comes from a single type of formal.
Big data is always changing
Big data is characterized by the 4 Vs:
Volume – Large amounts of data.
Velocity – Data is generated rapidly and continuously changing.
Variety – Data comes in multiple formats (structured, unstructured, multimedia, etc.).
Veracity – Ensuring data quality and reliability.
Among these, constant change (velocity) is a defining characteristic of big data.
(A) Incorrect – Big data is being generated slowly due to volume.
Big data is generated at high speed (velocity), not slowly.
(B) Incorrect – Big data must be relevant for the purposes of organizations.
While relevance is important, it is not a defining characteristic of big data.
(C) Incorrect – Big data comes from a single type of format.
Big data consists of multiple formats, including text, images, videos, and unstructured data.
(D) Correct – Big data is always changing.
Big data is dynamic and constantly updated in real-time.
This high velocity and continuous flow of information is a key characteristic.
IIA’s GTAG (Global Technology Audit Guide) – Big Data and Analytics
Describes how big data is constantly evolving.
NIST Big Data Framework – Key Characteristics
Defines volume, velocity, variety, and veracity as essential traits.
COBIT Framework – IT Governance and Data Management
Emphasizes the need for organizations to manage rapidly changing data.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
An internal audit engagement team found that the risk register of the project under review did not include significant risks identified by the internal audit function. The project manager explained that risk register preparations are facilitated by risk managers and that each project’s risk review follows the same set of questions. Which of the following recommendations will likely add the greatest value to the project management process of the organization?
Update the risk register of the project with the newly identified risks
Train senior management on risk management principles
Revise the methodology of the project risk identification process
Reassign the responsibility of risk register completion to risk managers
The root cause of the missing significant risks lies in the methodology used for risk identification. If the process relies too rigidly on a standard set of questions, it may overlook critical risks. By revising the risk identification methodology, the organization ensures that future projects capture relevant risks comprehensively and consistently, adding long-term value.
Option A addresses only the current project, not the underlying issue. Option B may improve knowledge but does not fix the flawed process. Option D merely shifts responsibility but does not address the methodology weakness.
Which of the following assessments will assist in evaluating whether the internal audit function is consistently delivering quality engagements?
Periodic assessments
Ongoing monitoring
Full external assessments
Self-Assessment with Independent Validation (SAIV)
The QAIP (Quality Assurance and Improvement Program) requires both ongoing monitoring and periodic assessments. Among these, ongoing monitoring is the mechanism that ensures continuous evaluation of whether engagements are being performed with quality and in conformance with the Standards.
Option A (periodic assessments) review effectiveness but are not continuous. Option C (external assessments) and Option D (SAIV) are broader and periodic, not engagement-level consistency checks.
Which of the following would best contribute to the success of a guest auditor program that allows people from other areas of the organization to serve as subject matter experts?
Selecting guest auditors whose work has recently been audited by the internal audit function
Recommending the guest auditor to design the internal audit program and perform testing procedures
Soliciting feedback from the guest auditor once the engagement is complete
Enabling the guest auditor to interact with internal audit staff to identify mutually beneficial opportunities
The purpose of a guest auditor program is to leverage subject matter expertise from other areas while also enhancing collaboration and mutual learning between business units and internal audit. Allowing guest auditors to interact with internal audit staff fosters knowledge sharing, trust, and future cooperation.
Option A may create conflicts of interest. Option B compromises independence by allowing guest auditors to design and test audit procedures. Option C provides feedback but occurs after the engagement, not during.
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
An extranet
A local area network
An Intranet
The internet
An Intranet is a private network that is accessible only to an organization’s personnel. It is used for internal communication, data sharing, and collaboration while ensuring security and restricted access.
Let’s analyze each option:
Option A: An extranet
Incorrect. An extranet extends an organization’s internal network to external parties such as vendors, suppliers, or business partners. Since the organization wants to allow access only to its personnel, an extranet is not the right choice.
Option B: A local area network (LAN)
Incorrect. While a LAN is a network within a limited geographic area (such as an office), it does not necessarily restrict access only to personnel. Additionally, an intranet operates over a LAN but includes access controls and authentication mechanisms.
Option C: An Intranet
Correct. An intranet is specifically designed for internal use, allowing employees to securely share documents, collaborate, and access internal resources. Organizations can implement access control mechanisms to restrict access to authorized personnel only.
IIA Reference: Internal auditors assess IT security to ensure that internal networks (such as intranets) have appropriate access restrictions to protect sensitive data. (IIA GTAG: Auditing IT Networks)
Option D: The internet
Incorrect. The internet is a public network that does not restrict access. Using the internet for internal communication would expose sensitive data to external threats.
Thus, the verified answer is C. An Intranet.
Which of the following actions is likely to reduce the risk of violating transfer pricing regulations?
The organization sells inventory to an overseas subsidiary at fair value.
The local subsidiary purchases inventory at a discounted price.
The organization sells inventory to an overseas subsidiary at the original cost.
The local subsidiary purchases inventory at the depreciated cost.A
Transfer pricing regulations aim to prevent tax evasion and ensure that intercompany transactions reflect fair market value, preventing profit shifting to low-tax jurisdictions. Selling inventory at fair value (arm’s length price) aligns with regulatory requirements, reducing the risk of non-compliance.
(A) Correct – The organization sells inventory to an overseas subsidiary at fair value.
Ensuring that transactions reflect fair market value prevents regulatory violations.
Adhering to the arm’s length principle minimizes transfer pricing risks and potential tax penalties.
(B) Incorrect – The local subsidiary purchases inventory at a discounted price.
A discounted price could be seen as an attempt to shift profits between entities, increasing regulatory scrutiny.
(C) Incorrect – The organization sells inventory to an overseas subsidiary at the original cost.
Selling at the original cost does not account for market conditions, potential markup, and fair valuation.
Regulators may view this as non-compliance with the arm’s length principle.
(D) Incorrect – The local subsidiary purchases inventory at the depreciated cost.
Depreciated cost may not represent fair market value and could be interpreted as a tax avoidance mechanism.
IIA’s Global Internal Audit Standards – Compliance with Tax and Transfer Pricing Regulations
Emphasizes fair pricing in intercompany transactions to prevent regulatory violations.
OECD Transfer Pricing Guidelines
Reinforces the arm’s length principle as the standard for pricing related-party transactions.
COSO’s ERM Framework – Compliance Risk Management
Highlights the need for adherence to tax laws and fair-value pricing in financial transactions.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following controls would be most efficient to protect business data from corruption and errors?
Controls to ensure data is unable to be accessed without authorization.
Controls to calculate batch totals to identify an error before approval.
Controls to encrypt the data so that corruption is likely ineffective.
Controls to quickly identify malicious intrusion attempts.
To efficiently protect business data from corruption and errors, the best approach is proactive detection through validation controls. Batch total calculations help verify data integrity before approval, ensuring errors are caught early.
(A) Controls to ensure data is unable to be accessed without authorization.
Incorrect: Access controls prevent unauthorized access, but they do not detect or prevent data corruption/errors.
(B) Controls to calculate batch totals to identify an error before approval. (Correct Answer)
Batch control totals ensure that data entries match expected values before processing, helping detect errors before approval.
IIA GTAG 3 – Continuous Auditing recommends automated validation and reconciliation checks for data integrity.
(C) Controls to encrypt the data so that corruption is likely ineffective.
Incorrect: Encryption protects data confidentiality, but it does not prevent or detect errors or corruption.
(D) Controls to quickly identify malicious intrusion attempts.
Incorrect: Intrusion detection systems focus on cybersecurity, not data corruption or errors.
IIA Standard 2120 – Risk Management: Recommends controls for error prevention and early detection.
IIA GTAG 3 – Continuous Auditing: Suggests automated validation processes like batch totals to detect errors before approval.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (B) because batch total calculations effectively detect errors before approval, ensuring data integrity.
The budgeted cost of work performed is a metric best used to measure which project management activity?
Resource planning.
Cost estimating
Cost budgeting.
Cost control.
Understanding the Metric:
The Budgeted Cost of Work Performed (BCWP), also known as Earned Value (EV), represents the value of work actually performed up to a specific date, based on the budgeted cost.
This metric is part of Earned Value Management (EVM) and is used to track project performance by comparing planned and actual progress.
Why Cost Control?
Cost control involves monitoring expenses, comparing actual performance with the budget, and taking corrective actions when needed.
BCWP is a core metric in cost control as it helps in determining whether a project is staying within budget.
Why Other Options Are Incorrect:
A. Resource planning: Focuses on allocating personnel, equipment, and materials but does not deal with financial performance.
B. Cost estimating: Involves predicting project costs before execution, but BCWP is used during the project, not during estimation.
C. Cost budgeting: Refers to setting a budget, whereas BCWP measures how much work has been performed relative to that budget.
IIA Standards and References:
IIA Standard 2120 – Risk Management: Internal auditors should assess cost control mechanisms to manage financial risks.
IIA Practice Guide: Auditing Capital Projects (2016): Emphasizes earned value management as a key cost control measure.
PMBOK Guide – Cost Management Knowledge Area: Highlights BCWP as a crucial tool for monitoring and controlling project costs.
The sole internal auditor of a municipality wants to implement proper supervision over internal audit workpapers. Which of the following would be the most appropriate?
According to the Global Internal Audit Standards, in this situation the internal auditor can perform a self-review of selected workpapers
Request each engagement client to conduct a review of a sample of workpapers at the end of the engagement
Ask the board or management to sign off on workpapers
Engage peer reviewers from other organizations with legal precautions in place
The Global Internal Audit Standards require that workpapers be properly supervised and reviewed to ensure quality and compliance. A sole auditor cannot perform a meaningful self-review (Option A). Having clients review workpapers (Option B) compromises independence. Having management or the board sign off (Option C) is also inappropriate as it undermines audit objectivity.
The most suitable solution is to arrange for peer reviews from external auditors or other organizations, with confidentiality and legal safeguards in place. This provides independent oversight while maintaining audit quality.
Which of the following is required in effective IT change management?
The sole responsibility for change management is assigned to an experienced and competent IT team
Change management follows a consistent process and is done in a controlled environment.
Internal audit participates in the implementation of change management throughout the organisation.
All changes to systems must be approved by the highest level of authority within an organization.
Effective IT Change Management Principles:
Change management ensures that modifications to IT systems are controlled, tested, and implemented in a way that reduces risks.
A structured and consistent process is required to prevent disruptions, maintain system integrity, and comply with governance requirements.
IIA Standard 2110 - Governance:
IT governance must include structured change management processes.
Change management should be repeatable and standardized to ensure effectiveness.
IIA GTAG (Global Technology Audit Guide) on Change Management:
Change management must be conducted in a controlled environment to minimize unintended consequences and security risks.
A. The sole responsibility for change management is assigned to an experienced and competent IT team. (Incorrect)
While IT plays a key role, change management should involve multiple stakeholders, including business units, security, compliance, and risk management teams.
IIA Standard 2120 - Risk Management states that risk oversight should not be assigned to a single function.
C. Internal audit participates in the implementation of change management throughout the organization. (Incorrect)
Internal audit evaluates change management but does not implement it.
IIA Standard 1000 - Purpose, Authority, and Responsibility emphasizes that internal audit provides independent assurance rather than operational involvement.
D. All changes to systems must be approved by the highest level of authority within an organization. (Incorrect)
Approvals should be based on a risk-based hierarchy rather than requiring executive-level approval for all changes.
IIA GTAG - Change Management recommends a tiered approval system based on change complexity and risk impact.
Explanation of Incorrect Answers:Conclusion:The most critical factor in effective IT change management is having a consistent, controlled process (Option B).
IIA References:
IIA Standard 2110 - Governance
IIA Standard 2120 - Risk Management
IIA Standard 1000 - Purpose, Authority, and Responsibility
IIA GTAG - Change Management
Which approach should a chief audit executive take when preparing the internal audit plan?
Organize the auditable units within the organization into an audit universe to facilitate risk assessment
Select auditable units within the organization based on monetary values
Evaluate auditable units based on senior management's information about risks
Eliminate auditable units not mandated to be audited by laws and regulations applicable to the organization
The internal audit plan should be risk-based. To achieve this, the CAE should develop an audit universe that lists all auditable units (processes, functions, systems, etc.) and use it as the foundation for risk assessment and prioritization.
Option B is too narrow (monetary value is just one factor). Option C is incomplete since senior management’s input is important but not the sole basis. Option D is incorrect because eliminating units not mandated by law ignores risk-based planning requirements.
Thus, the most appropriate approach is Option A: establishing an audit universe.
Which of the following IT-related activities is most commonly performed by the second line of defense?
Block unauthorized traffic.
Encrypt data.
Review disaster recovery test results.
Provide independent assessment of IT security.
Understanding the Three Lines of Defense Model:
First Line of Defense (Operational Management): Performs daily IT security tasks, such as blocking unauthorized traffic and encrypting data.
Second Line of Defense (Risk Management & Compliance): Monitors and reviews security controls, including disaster recovery testing and risk management activities.
Third Line of Defense (Internal Audit): Provides an independent assessment of IT security controls.
Why Option C (Review Disaster Recovery Test Results) Is Correct?
The second line of defense is responsible for monitoring and evaluating IT risk management processes, including disaster recovery and business continuity planning.
Reviewing disaster recovery test results ensures that the organization is prepared for IT disruptions and meets compliance requirements.
IIA Standard 2110 – Governance requires auditors to evaluate whether IT risk management activities (such as disaster recovery) are being effectively monitored.
Why Other Options Are Incorrect?
Option A (Block unauthorized traffic):
This is a first-line defense task, typically handled by IT security teams (e.g., firewall and intrusion detection system monitoring).
Option B (Encrypt data):
Encryption is part of daily IT security operations and is handled by the first line of defense.
Option D (Provide an independent assessment of IT security):
Independent assessments are the responsibility of internal audit (third line of defense), not the second line.
The second line of defense focuses on monitoring IT risk, making disaster recovery test review a key responsibility.
IIA Standard 2110 and the Three Lines of Defense Model confirm this role.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT Risk Management)
IIA Three Lines of Defense Model
COBIT Framework – IT Governance & Risk Management
During an audit of the payroll system, the internal auditor identifies and documents the following condition:
"Once a user is logged into the system, the user has access to all functionality within the system."
What is the most likely root cause for tins issue?
The authentication process relies on a simple password only, which is a weak method of authorization.
The system authorization of the user does not correctly reflect the access rights intended.
There was no periodic review to validate access rights.
The application owner apparently did not approve the access request during the provisioning process.
The issue described suggests a systemic authorization flaw, where users gain unrestricted access once logged in. This points to an improperly configured authorization system, which should enforce role-based or least-privilege access to restrict users based on their job responsibilities.
(A) Incorrect – The authentication process relies on a simple password only, which is a weak method of authorization.
While weak authentication is a security risk, the issue described relates to excessive access permissions, not weak login credentials.
(B) Correct – The system authorization of the user does not correctly reflect the access rights intended.
The problem is that users have access to all functionality, which indicates an authorization issue, not an authentication flaw.
Proper role-based access controls (RBAC) should limit user permissions based on job functions.
(C) Incorrect – There was no periodic review to validate access rights.
While periodic reviews are important for detecting unauthorized access, the issue here is a system-level authorization design flaw rather than a failure in periodic reviews.
(D) Incorrect – The application owner apparently did not approve the access request during the provisioning process.
Even if an access request was approved incorrectly, the broader issue remains that all users have unrestricted access, which suggests a system misconfiguration rather than a single provisioning error.
IIA’s GTAG (Global Technology Audit Guide) – Access Control and Authorization
Emphasizes the need for role-based access control (RBAC) to prevent unauthorized access.
COBIT Framework – IT Security Governance
Discusses proper authorization mechanisms to align system access with business needs.
NIST Cybersecurity Framework – Access Management Controls
Recommends restricting access rights based on the principle of least privilege (PoLP).
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
IT database administrator.
IT data center manager.
IT help desk function.
IT network administrator.
Maintaining the infrastructure for a real-time database backup involves ensuring that backups are correctly configured, continuously running, and fail-safe mechanisms are in place to prevent data loss. The most appropriate role for this responsibility is the IT database administrator (DBA) because:
Primary Role of a DBA:
The DBA is responsible for managing database performance, availability, backup strategies, and recovery processes.
Ensures that real-time backups are functioning properly and failure risks are mitigated.
Database Infrastructure & Backup Strategies:
DBAs configure, monitor, and troubleshoot real-time backup solutions such as replication, mirroring, and log shipping.
They work with backup tools like Oracle Data Guard, SQL Server Always On, and MySQL replication.
Disaster Recovery & Data Integrity:
The DBA ensures data consistency and integrity, especially during system failures or cyber incidents.
They set up recovery point objectives (RPO) and recovery time objectives (RTO) for database resilience.
Option B (IT Data Center Manager):
Oversees physical and environmental infrastructure (e.g., servers, cooling, and power systems). Not directly responsible for database backup failure prevention. (Incorrect)
Option C (IT Help Desk Function):
Provides user support and troubleshooting but does not manage backup infrastructure. (Incorrect)
Option D (IT Network Administrator):
Manages network configurations, security, and connectivity but does not handle database backup infrastructure. (Incorrect)
IIA GTAG – "Auditing Business Continuity and Disaster Recovery": Emphasizes the role of DBAs in backup infrastructure.
COBIT 2019 – BAI10.02 (Manage Backup and Restore): Assigns database backup management responsibilities primarily to DBAs.
IIA's "Auditing IT Operations": Recommends that database administration teams ensure backup mechanisms are tested regularly.
Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. IT database administrator.
Which of the following statements is true regarding multi-report summaries for members of senior management and the board?
Multi-report summaries should be used to describe the work performed by the internal audit function
In developing multi-report summaries, internal auditors should use multi-row and multi-column tables
Multi-report summaries are not useful to boards that see every engagement report
Multi-report summaries are readily developed if each finding is rated
Multi-report summaries are designed to provide senior management and the board with aggregated results across multiple audit engagements. To make them effective, internal audit functions typically rate findings (e.g., high, medium, low) so results can be compared and summarized efficiently.
Option A is incomplete because summaries are not just about describing audit work but about presenting meaningful insights. Option B (tables) refers to presentation style, not the key principle. Option C is incorrect because even if boards review individual reports, summaries provide strategic insights across engagements.
Thus, the correct answer is Option D.
How should a chief audit executive learn about emerging risk areas in an organization?
Build and maintain a collaborative network with management
Build an organization-wide risk management process
Review the organization's procedures for conducting an annual risk assessment
Review the organization's procedures for establishing its risk appetite
The CAE should remain aware of emerging risks through ongoing communication and collaboration with senior management and other stakeholders. Building strong relationships allows the CAE to obtain early insights into new and developing risks.
Option B (building a risk management process) is management’s responsibility, not internal audit’s. Options C and D involve reviewing processes, but they do not directly expose the CAE to emerging risks in real time.
Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?
Boundary defense
Malware defense.
Penetration tests
Wireless access controls
Malware Defense as a Cybersecurity Monitoring Activity:
Malware defense refers to the use of antivirus software, endpoint detection and response (EDR), behavior analysis, and real-time monitoring to detect and block malicious code before it can be installed on an organization's systems.
It helps prevent infections from viruses, ransomware, spyware, trojans, and worms that can disrupt business operations.
IIA GTAG (Global Technology Audit Guide) on Cybersecurity states that monitoring tools should proactively detect and neutralize threats before they can execute malicious actions.
A. Boundary defense (Incorrect)
Boundary defense includes firewalls, intrusion detection/prevention systems (IDS/IPS), and network segmentation, which control external access but do not directly monitor and remove malware.
Malware can still enter through phishing emails, infected USB drives, or compromised internal systems.
C. Penetration tests (Incorrect)
Penetration tests simulate attacks to identify vulnerabilities, but they do not actively monitor and prevent malware from being installed.
They help improve security but are not a continuous monitoring activity.
D. Wireless access controls (Incorrect)
Wireless security helps prevent unauthorized network access, but it does not specifically monitor and block malware installation.
Malware can still spread via legitimate access points, infected devices, or phishing attacks.
Explanation of Answer Choice B (Correct Answer):Explanation of Incorrect Answers:Conclusion:To deter disruptive codes (malware) from being installed, organizations should implement continuous malware defense (Option B), including antivirus software, endpoint security, and behavioral analytics.
IIA References:
IIA GTAG - Cybersecurity
IIA Standard 2120 - Risk Management
Which of the following statements is true regarding data backup?
System backups should always be performed in real-time.
Backups should be stored in a secured location onsite for easy access.
The tape rotation schedule affects how long data is retained.
Backup media should be restored only in case of a hardware or software failure.
Comprehensive and Detailed In-Depth Explanation:
The tape rotation schedule is a method used to manage and organize backup media to ensure data is retained for the required period and can be restored when necessary. Different rotation schemes, such as Grandfather-Father-Son (GFS), determine how long each backup tape is kept before being overwritten, directly affecting data retention policies. While real-time backups (option A) provide continuous data protection, they are not always necessary or practical for all systems. Storing backups onsite (option B) offers quick access but may not protect against site-specific disasters; offsite storage is often recommended. Regular restoration tests (contrary to option D) are essential to ensure backup integrity and reliability, not just in failure scenarios.
Which of the following is a security feature that Involves the use of hardware and software to filter or prevent specific Information from moving between the inside network and the outs de network?
Authorization
Architecture model
Firewall
Virtual private network
Definition of a Firewall:
A firewall is a network security device (hardware or software) that monitors and controls incoming and outgoing network traffic.
It is designed to filter or prevent specific information from moving between internal and external networks, ensuring unauthorized access is blocked.
How a Firewall Works:
It uses rules and policies to determine whether to allow or block traffic.
Firewalls can be configured to prevent malware, hacking attempts, and unauthorized data transfers.
There are different types, including packet-filtering firewalls, stateful inspection firewalls, and next-generation firewalls (NGFWs).
Why Other Options Are Incorrect:
A. Authorization:
Authorization refers to user access control, ensuring users have the correct permissions, but it does not filter network traffic.
B. Architecture model:
An architecture model defines the structure of an IT system but does not actively prevent or filter data movement.
D. Virtual private network (VPN):
A VPN encrypts data and provides secure remote access but does not filter or block data movement between networks.
IIA’s Perspective on IT Security Controls:
IIA Standard 2110 – Governance emphasizes strong cybersecurity controls, including firewalls, to protect sensitive data.
IIA GTAG (Global Technology Audit Guide) on Information Security recommends using firewalls as a primary defense mechanism.
NIST Cybersecurity Framework and ISO 27001 Security Standards identify firewalls as critical tools for network security and data protection.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – Information Security Risks
NIST Cybersecurity Framework
Which of the following would most likely be found in an organization that uses a decentralized organizational structure?
There is a higher reliance on organizational culture.
There are clear expectations set for employees.
There are electronic monitoring techniques employed.
There is a defined code for employee behavior.
Comprehensive and Detailed In-Depth Explanation:
A decentralized organizational structure distributes decision-making authority across multiple levels. This requires a strong organizational culture to guide decision-making in the absence of centralized control.
Option B (Clear expectations) – While true, this applies to both centralized and decentralized structures.
Option C (Electronic monitoring) – More common in centralized control environments.
Option D (Defined code of behavior) – Found in all organizations, not unique to decentralization.
Since decentralized organizations rely more on cultural alignment, Option A is correct.
An organization decided to reorganize into a flatter structure. Which of the following changes would be expected with this new structure?
Lower costs.
Slower decision making at the senior executive level.
Limited creative freedom in lower-level managers.
Senior-level executives more focused on short-term, routine decision making
A flatter organizational structure reduces hierarchical levels and promotes greater autonomy for employees. The primary benefit is cost reduction due to fewer management layers and streamlined decision-making.
Fewer Management Layers – Reduces the number of mid-level managers, decreasing salary expenses.
Increased Operational Efficiency – Less bureaucracy leads to faster decision-making, lowering administrative costs.
Encourages Employee Autonomy – Reduces dependence on supervision, improving productivity.
B. Slower decision-making at the senior executive level – Incorrect because flatter structures lead to faster decision-making due to fewer approval levels.
C. Limited creative freedom in lower-level managers – Incorrect because flatter structures provide more autonomy and innovation opportunities.
D. Senior-level executives more focused on short-term, routine decision-making – Incorrect because executives in a flatter structure focus on strategic, high-level decisions, delegating routine tasks.
IIA’s GTAG on Governance and Risk Management – Discusses the financial and operational impacts of different organizational structures.
COSO’s Enterprise Risk Management (ERM) Framework – Emphasizes how flatter structures reduce operational inefficiencies and costs.
COBIT 2019 (Governance Framework) – Highlights the impact of organizational structure on financial performance.
Why Lower Costs is the Correct Answer?Why Not the Other Options?IIA References:
An organization buys equity securities for trading purposes and sells them within a short time period. Which of the following is the correct way to value and report those securities at a financial statement date?
At fair value with changes reported in the shareholders' equity section.
At fair value with changes reported in net income.
At amortized cost in the income statement.
As current assets in the balance sheet
When an organization buys equity securities for trading purposes, it means that these securities are classified as trading securities. According to International Financial Reporting Standards (IFRS) and Generally Accepted Accounting Principles (GAAP):
Trading securities are measured at fair value.
Unrealized gains and losses from changes in fair value are recognized in net income, not in shareholders' equity.
A. At fair value with changes reported in the shareholders' equity section. (Incorrect)
This treatment applies to available-for-sale (AFS) securities under previous GAAP rules, but not to trading securities.
Under IFRS 9, AFS classification has been removed, and most equity investments are recorded at fair value through profit or loss (FVTPL).
B. At fair value with changes reported in net income. (Correct)
This is the correct treatment for trading securities, as per IFRS 9 and ASC 320 (FASB).
C. At amortized cost in the income statement. (Incorrect)
Amortized cost is used for held-to-maturity (HTM) debt securities, not for equity securities held for trading.
D. As current assets in the balance sheet. (Partially Correct but Incomplete)
While trading securities are usually classified as current assets, this answer does not address valuation and reporting of changes in fair value.
IIA Practice Guide: Auditing Investments highlights the importance of correctly valuing securities based on accounting standards.
IFRS 9 – Financial Instruments mandates fair value measurement for trading securities with gains/losses reported in profit or loss.
GAAP ASC 320 – Investments – Debt and Equity Securities aligns with IFRS, requiring fair value reporting through net income.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. At fair value with changes reported in net income.
Which of the following is the most appropriate way lo record each partner's initial Investment in a partnership?
At the value agreed upon by the partners.
At book value.
At fair value
At the original cost.
Recording Initial Investment in a Partnership:
When forming a partnership, each partner contributes assets, cash, or services to the business.
The initial investment should be recorded at the value agreed upon by the partners, which may differ from fair market value or book value.
This is because partnerships are formed based on mutual agreement, and partners decide how to allocate capital and contributions.
Why Other Options Are Incorrect:
B. At book value:
Book value refers to the value recorded in a partner’s individual financial statements. However, in a new partnership, the previous book value is not relevant.
C. At fair value:
While fair value is commonly used in financial reporting, in partnerships, the agreed-upon value is more relevant as partners may negotiate different terms.
D. At the original cost:
The original cost of assets contributed may not reflect their current market or partnership-agreed value, making it an inappropriate basis for initial recording.
IIA’s Perspective on Financial Recording:
IIA Standard 1220 – Due Professional Care requires auditors to ensure that financial transactions are recorded in accordance with agreed terms.
COSO Internal Control – Integrated Framework supports the principle that partnership agreements should dictate valuation methods.
GAAP & IFRS Accounting Guidelines recognize that partnership accounting is based on agreed-upon contributions rather than standardized valuation methods.
IIA References:
IIA Standard 1220 – Due Professional Care
COSO Internal Control – Integrated Framework
GAAP & IFRS Partnership Accounting Standards
Which of the following is an example of an application control?
Automated password change requirements.
System data backup process.
User testing of system changes.
Formatted data fields.
Comprehensive and Detailed In-Depth Explanation:
Application controls are specific to software applications and help ensure data integrity and accuracy within systems.
Option A (Automated password change requirements) – A system security control, not specific to a single application.
Option B (System data backup) – A general IT control, not an application control.
Option C (User testing of system changes) – Part of software development controls, not an application-level control.
Formatted data fields ensure that users enter information in the correct format, preventing errors and improving data accuracy.
Since formatted data fields are an application-specific control, Option D is correct.
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?
A warm recovery plan.
A cold recovery plan.
A hot recovery plan.
A manual work processes plan
A disaster recovery plan (DRP) ensures that an organization can restore operations after a major IT system failure. The level of readiness depends on the type of recovery site used:
Correct Answer (A - A Warm Recovery Plan)
A warm site is a partially configured recovery site with some hardware and network infrastructure in place.
In the event of a disaster, some configuration and data restoration are required before full operation can resume.
This solution balances cost and recovery speed, making it ideal for moderate-risk scenarios.
The IIA GTAG 10: Business Continuity Management discusses warm sites as an effective disaster recovery solution.
Why Other Options Are Incorrect:
Option B (A Cold Recovery Plan):
A cold site has minimal infrastructure and requires significant time for setup and data restoration.
This is not ideal for organizations needing faster recovery.
Option C (A Hot Recovery Plan):
A hot site is a fully operational backup system that allows instant recovery, but it is very costly.
The scenario mentions "some configuration and data restoration", which suggests a warm site, not a hot site.
Option D (A Manual Work Processes Plan):
A manual plan involves non-IT solutions, which would not address IT system restoration.
IIA GTAG 10: Business Continuity Management – Describes warm, cold, and hot sites for disaster recovery.
IIA Practice Guide: Auditing Business Continuity Plans – Recommends warm recovery sites for balancing cost and recovery time.
Step-by-Step Explanation:IIA References for Validation:Thus, A is the correct answer because a warm recovery plan allows partial system readiness with minimal downtime.
The board and senior management agree to outsource the internal audit function. Which of the following is true regarding the company’s quality assurance and improvement program (QAIP)?
The organization is responsible for maintaining an effective QAIP
The organization is responsible for the internal assessment of the QAIP
The service provider is responsible for the external assessment of the QAIP every three years
The QAIP should be postponed until the organization insources or cosources the internal audit function
Even when outsourcing the internal audit function, the organization retains responsibility for ensuring the internal audit activity complies with the Standards. This includes maintaining a QAIP to assess effectiveness and quality. The provider executes the function, but the CAE and the organization’s oversight bodies remain accountable for quality.
Options B and C are incorrect since internal and external assessments may be performed by the provider, but ultimate responsibility rests with the organization. Option D (postponement) would violate the Standards.
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.
Ensure that relevant access to key applications is strictly controlled through an approval and review process.
Institute detection and authentication controls for all devices used for network connectivity and data storage.
Use management software scan and then prompt parch reminders when devices connect to the network
Understanding BYOD Risks:
A Bring-Your-Own-Device (BYOD) policy allows employees to use personal devices (e.g., laptops, smartphones, tablets) for work.
This increases security risks such as unauthorized access, malware infections, data leakage, and non-compliance with IT security policies.
Why Option C (Detection and Authentication Controls) Is Correct?
Detection and authentication controls ensure that:
Only authorized devices can connect to the organization's network.
User authentication mechanisms (such as multi-factor authentication) verify identities before granting access.
Devices with security vulnerabilities are flagged and restricted.
This aligns with IIA Standard 2110 – Governance, which emphasizes IT security controls for risk mitigation.
ISO 27001 and NIST Cybersecurity Framework also recommend device authentication and monitoring for secure network access.
Why Other Options Are Incorrect?
Option A (Limit personal use of employee devices):
Limiting personal use does not fully address network security risks; malware can still infect devices.
Option B (Control access through approvals and reviews):
While access control is important, it does not mitigate the broader risks of compromised devices connecting to the network.
Option D (Software scans and patch reminders):
Patching is important, but it does not prevent unauthorized access or ensure authentication for devices.
Implementing device detection and authentication controls is the most effective way to mitigate security risks in a BYOD environment.
IIA Standard 2110 and ISO 27001 emphasize strong network security measures.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (IT Risk Management & BYOD Security)
ISO 27001 – Information Security Management
NIST Cybersecurity Framework – Access Control & Authentication
A new manager received computations of the internal fate of return regarding the project proposal. What should the manager compare the computation results to in order to determine whether the project is potentially acceptable?
Compare to the annual cost of capital
Compare to the annual interest data.
Compare to the required rate of return.
Compare to the net present value.
The internal rate of return (IRR) is a measure used to evaluate the profitability of an investment. The project is considered acceptable if its IRR is greater than or equal to the required rate of return (RRR), which is the minimum return an organization expects from an investment.
Correct Answer (C - Compare to the Required Rate of Return)
The required rate of return (RRR) represents the minimum acceptable return for the project.
If IRR ≥ RRR, the project is acceptable. If IRR < RRR, the project is rejected.
The IIA Practice Guide: Auditing Capital Investments suggests comparing IRR to the RRR to ensure financial feasibility.
Why Other Options Are Incorrect:
Option A (Compare to the annual cost of capital):
The cost of capital (WACC - Weighted Average Cost of Capital) is an important factor, but RRR is the direct benchmark for IRR comparison.
Option B (Compare to the annual interest rate):
Interest rates do not determine project feasibility—they only affect financing costs.
Option D (Compare to the net present value - NPV):
NPV and IRR are related, but they serve different purposes.
IRR is compared against RRR, while NPV measures absolute profitability in dollar terms.
IIA Practice Guide: Auditing Capital Investments – Discusses IRR, RRR, and investment decision-making.
IIA GTAG 3: Business Case Development – Explains how financial metrics like IRR and RRR are used in decision-making.
Step-by-Step Explanation:IIA References for Validation:Thus, C is the correct answer because IRR should be compared to the required rate of return to determine project acceptability.
For employees, the primary value of implementing job enrichment is which of the following?
Validation of the achievement of their goals anti objectives
Increased knowledge through the performance of additional tasks
Support for personal growth and a meaningful work experience
An increased opportunity to manage better the work done by their subordinates
Job enrichment is a motivational strategy where employees are given more control, responsibility, and meaningful tasks in their roles. It aims to increase job satisfaction, personal growth, and motivation by making work more engaging and fulfilling.
Let’s analyze each option:
Option A: Validation of the achievement of their goals and objectives
Incorrect.
While job enrichment may contribute to achieving personal and professional goals, its primary purpose is not just validation but improving employee engagement and motivation.
Option B: Increased knowledge through the performance of additional tasks
Incorrect.
Job enlargement (not job enrichment) involves assigning additional tasks without necessarily increasing responsibility or autonomy.
Job enrichment focuses on providing meaningful and challenging work, not just adding tasks.
Option C: Support for personal growth and a meaningful work experience
Correct.
Job enrichment enhances job satisfaction by giving employees greater autonomy, responsibility, and purpose in their roles.
It encourages personal and professional development, leading to a more meaningful work experience.
IIA Reference: Internal auditors assessing human resource and organizational performance management focus on employee motivation strategies, including job enrichment. (IIA Practice Guide: Talent Management and Human Capital Risks)
Option D: An increased opportunity to manage better the work done by their subordinates
Incorrect.
Job enrichment does not necessarily focus on managing subordinates but rather on enhancing individual job roles by making them more fulfilling.
Thus, the verified answer is C. Support for personal growth and a meaningful work experience.
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?
Income statement.
Owner's equity statement.
Balance sheet.
Statement of cash flows.
Understanding Financial Statements:
Income Statement (Option A) shows a company's revenues and expenses over a period but does not detail cash movements.
Owner's Equity Statement (Option B) tracks changes in the ownership interest but does not explain cash usage comprehensively.
Balance Sheet (Option C) provides a snapshot of financial position (assets, liabilities, and equity) at a given time, but not the flow of cash.
Statement of Cash Flows (Option D) details where cash comes from and how it is spent during a specific period, making it the best disclosure of money movement.
Why the Statement of Cash Flows is the Best Answer:
It categorizes cash flows into operating, investing, and financing activities to explain how cash is generated and utilized.
It is critical for assessing liquidity, solvency, and overall financial health.
Investors, auditors, and management use this statement to evaluate a company's ability to generate cash and meet obligations.
IIA Standard 2120 – Risk Management: Internal auditors assess financial risks, including cash management.
IIA GTAG (Global Technology Audit Guide) on Business Continuity and Liquidity: Emphasizes the importance of cash flow analysis for financial stability.
COSO’s Internal Control Framework: Highlights the role of financial reporting, including cash flows, in risk management.
Relevant IIA References:✅ Final Answer: Statement of Cash Flows (Option D).
An organization with global headquarters in the United States has subsidiaries in eight other nations. If the organization operates with an ethnocentric attitude, which of the following statements is true?
Standards used for evaluation and control are determined at local subsidiaries, not set by headquarters
Orders, commands, and advice are sent to the subsidiaries from headquarters
People of local nationality are developed for the best positions within their own country
There is a significant amount of collaboration between headquarters and subsidiaries
Which of the following attributes of data analytics relates to the growing number of sources from which data is being generated?
Volume.
Velocity.
Variety.
Veracity.
Understanding the Attributes of Data Analytics (The Four Vs of Big Data):
Volume: Refers to the massive amount of data generated.
Velocity: Refers to the speed at which data is created and processed.
Variety: Refers to the different types and sources of data.
Veracity: Refers to data accuracy and reliability.
Why Variety is the Correct Answer:
Variety represents the increasing number of data sources (e.g., social media, IoT devices, cloud storage, structured/unstructured data, etc.).
As data sources grow, internal auditors must evaluate data integrity, consistency, and reliability across multiple formats and systems.
Why Other Options Are Incorrect:
A. Volume: Refers to the size of data, not the number of sources.
B. Velocity: Refers to how fast data is generated and processed, not its diversity.
D. Veracity: Refers to data accuracy, not the number of sources.
IIA Standards and References:
IIA GTAG on Data Analytics (2017): Highlights the role of variety in managing data from multiple sources.
IIA Standard 1220 – Due Professional Care: Auditors must assess data variety when using analytics for decision-making.
COSO ERM Framework: Addresses the importance of integrating diverse data sources for risk management.
Which of the following lists is comprised of computer hardware only?
A central processing unit, a scanner, and a value-added network
A computer chip, a data warehouse, and a router
A server, a firewall, and a smartphone
A workstation, a modem, and a disk drive
Comprehensive and Detailed In-Depth Explanation:
Computer hardware refers to the physical components of a computer system.
Workstation: A high-performance computer designed for technical or scientific applications.
Modem: A device that modulates and demodulates signals for data transmission over communication lines.
Disk drive: A device that reads and/or writes data to a disk storage medium.
Option D lists only physical components, fitting the definition of computer hardware.
In contrast:
Value-added network (option A): A hosted service offering specialized networking services, not a physical component.
Data warehouse (option B): A system used for reporting and data analysis, representing a data storage concept rather than a physical device.
Firewall (option C): While it can be hardware, it is often implemented as software; thus, the term doesn't exclusively denote hardware.
Therefore, option D accurately represents a list of computer hardware components.
According to IIA guidance, which of the following would be the best first stop to manage risk when a third party is overseeing the organization's network and data?
Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations.
Drafting a strong contract that requires regular vendor control reports end a right-to-audit clause.
Applying administrative privileges to ensure right to access controls are appropriate.
Creating a standing cyber-security committee to identify and manage risks related to data security
When an organization outsources network and data management to a third party, the first step in risk management is to ensure that the contractual agreement includes strong governance provisions, including:
Regular vendor control reports to monitor security and performance.
A right-to-audit clause, allowing the organization to periodically assess compliance and security controls.
Correct Answer (B - Drafting a Strong Contract with Vendor Control Reports & Right-to-Audit Clause)
IIA Practice Guide: Auditing Third-Party Risk Management recommends that contracts with vendors include clear security expectations, reporting requirements, and audit rights.
A right-to-audit clause allows internal auditors to verify compliance with security policies.
Vendor control reports (e.g., SOC 2 reports) provide assurance that the vendor meets security and compliance standards.
Why Other Options Are Incorrect:
Option A (Creating a comprehensive reporting system for vendors):
While useful, a reporting system alone is not the first step—it should be included after contractual protections are in place.
Option C (Applying administrative privileges to ensure appropriate access controls):
This applies to internal access management but does not address third-party risk management.
Option D (Creating a cybersecurity committee):
A cybersecurity committee helps manage ongoing risks, but contractual controls are the first step in managing third-party risk.
IIA Practice Guide: Auditing Third-Party Risk Management – Recommends strong contracts with right-to-audit clauses.
GTAG 7: Information Technology Outsourcing – Discusses vendor risk management and contractual safeguards.
Step-by-Step Explanation:IIA References for Validation:Thus, the best first step is drafting a strong contract with vendor control reports and a right-to-audit clause (B).
The chief audit executive (CAE) and management of the area under review disagree over managing a significant risk item. According to IIA guidance, which of the following actions should the CAE take first?
Refer the matter to the board for resolution
Consult the approved audit charter on supremacy of internal auditors’ decisions
Record management’s and the internal auditor's positions in the audit report
Discuss the issue in question further with senior management
When disagreements occur regarding risk management or audit findings, the CAE should first escalate the matter within management levels to attempt resolution. Only if the disagreement remains unresolved after discussion with senior management should the CAE report the matter to the board or audit committee.
Options B and C are premature: the charter does not grant internal audit supremacy over management’s decisions, and documenting disagreement in the audit report should occur only after reasonable attempts at resolution. Option A (escalating immediately to the board) should occur only if discussion with management does not resolve the issue.
Which of the following security controls would provide the most efficient and effective authentication for customers to access these online shopping account?
12-digit password feature.
Security question feature.
Voice recognition feature.
Two-level sign-on feature
Two-level (or multi-factor) authentication (MFA) is the most efficient and effective security control for authenticating customers when accessing online shopping accounts. It provides an extra layer of security beyond just passwords, making it more difficult for unauthorized users to gain access.
Stronger Authentication – It requires two independent verification methods, such as:
Something you know (password, PIN)
Something you have (one-time code, mobile device, smart card)
Something you are (biometric feature)
Reduces Risk of Credential Theft – Even if hackers obtain a user's password, they still need the second factor to gain access.
Meets Regulatory Standards – Many cybersecurity frameworks (NIST, ISO 27001, PCI-DSS) recommend or mandate MFA for customer authentication.
Enhanced Customer Trust – Provides users with better security, reducing risks of fraud or account takeovers.
A. 12-digit password feature – Longer passwords improve security, but they can still be compromised through phishing or brute force attacks.
B. Security question feature – These are often weak because users choose predictable answers (e.g., mother's maiden name).
C. Voice recognition feature – Biometric authentication is useful, but voice recognition can be bypassed using deepfake or recorded audio.
IIA’s GTAG (Global Technology Audit Guide) on Information Security Management – Recommends multi-factor authentication for access control.
IIA’s International Professional Practices Framework (IPPF) – Standard 2110.A2 – Highlights the need for strong security controls to protect customer data.
NIST SP 800-63 (Digital Identity Guidelines) – Encourages multi-factor authentication as a best practice for securing user accounts.
Why Two-Level Sign-On (MFA) Is the Best Choice?Why Not the Other Options?IIA References:✅ Final Answer: D. Two-level sign-on feature (Most effective for online customer authentication).
===============
If an organization has a high amount of working capital compared to the industry average, which of the following is most likely true?
Settlement of short-term obligations may become difficult.
Cash may be bed up in items not generating financial value.
Collection policies of the organization are ineffective.
The organization is efficient in using assets to generate revenue.
Working capital = Current Assets – Current Liabilities
A high amount of working capital compared to industry averages suggests that the organization may not be efficiently using its resources. This could mean that:
Excess cash is invested in inventory or accounts receivable, instead of being used for growth, investment, or shareholder returns.
The company may be holding too much inventory, which could lead to obsolescence or additional storage costs.
The business may have slow turnover in receivables, meaning cash is not being collected efficiently.
A. Settlement of short-term obligations may become difficult. (Incorrect)
A high working capital means the organization has sufficient assets to cover short-term obligations, so liquidity issues are unlikely.
B. Cash may be tied up in items not generating financial value. (Correct)
High working capital may indicate inefficient use of assets, such as excess inventory, high accounts receivable, or idle cash.
This can negatively impact return on assets (ROA) and overall financial performance.
C. Collection policies of the organization are ineffective. (Incorrect)
While high receivables can be a factor, working capital includes all current assets and liabilities, not just accounts receivable.
The issue could be inventory mismanagement or excess liquidity, not just collection policies.
D. The organization is efficient in using assets to generate revenue. (Incorrect)
A high working capital does not necessarily mean efficiency. In fact, it may indicate underutilized resources rather than optimized performance.
IIA GTAG 3 – Continuous Auditing: Implications for Internal Auditors highlights the importance of monitoring key financial metrics such as working capital.
IIA Practice Advisory 2130-1 – Assessing Organizational Performance emphasizes that internal auditors should assess whether financial resources are being used efficiently.
Financial Management Principles (IIA Guidance) discuss the impact of excessive working capital on liquidity and return on investment.
Explanation of Answer Choices:IIA References:Thus, the correct answer is B. Cash may be tied up in items not generating financial value.
According to I1A guidance on IT. which of the following activities regarding information security Is most likely to be the responsibility of line management as opposed to executive management, internal auditors, or the board?
Review and monitor security controls.
Dedicate sufficient security resources.
Provide oversight to the security function.
Assess information control environments.
Understanding Information Security Responsibilities:
Executive management sets the overall strategy and ensures resources are allocated for information security.
Internal auditors provide independent assurance on security effectiveness.
The board provides oversight and ensures that security risks are managed appropriately.
Line management is responsible for day-to-day operations, including the review and monitoring of security controls to ensure compliance with security policies.
Why Reviewing and Monitoring Security Controls is a Line Management Function:
Line management directly oversees operational security measures, ensuring that established controls are functioning effectively.
They address security gaps, enforce security policies, and report issues to senior management when necessary.
This aligns with IIA Standard 2120 – Risk Management, which requires management to implement and monitor risk mitigation controls.
Why Other Options Are Incorrect:
B. Dedicate sufficient security resources: This is the responsibility of executive management, as they control resource allocation.
C. Provide oversight to the security function: The board and executive management provide oversight, not line management.
D. Assess information control environments: Internal auditors assess control environments, ensuring compliance and effectiveness.
IIA Standards and References:
IIA Standard 2110 – Governance: Emphasizes the board’s role in overseeing security.
IIA Standard 2120 – Risk Management: States that management must monitor security risks.
IIA GTAG (Global Technology Audit Guide) on Information Security (2016): Outlines that line management is responsible for monitoring security controls on a daily basis.
Thus, the correct answer is A: Review and monitor security controls.
An IT auditor tested management of access rights and uncovered 48 instances where employees moved to a new position within the organization, but their former access rights were not revoked. System administrators explained that they did not receive information regarding employees’ new positions. Which of the following would be the best recommendation to address the root causes of the audit observation?
Conduct an inventory of access rights of all employees who have changed their position within the last year
Remove unneeded access rights for uncovered instances and reprimand system administrators for carelessness
Provide system administrators with job descriptions of employees and let them determine relevant access rights
Require that access rights to IT systems be ordered by process owners based on user role descriptions
The root cause is the lack of a structured process for updating access rights when employees change positions. The best recommendation is to establish a role-based access control system, where access rights are determined and approved by process owners, not left to administrators.
Option A is corrective but only retrospective. Option B wrongly blames administrators without addressing the systemic issue. Option C risks inconsistency, as administrators should not decide rights.
An internal auditor considers the financial statement of an organization as part of a financial assurance engagement. The auditor expresses the organization's electricity and depreciation expenses as a percentage of revenue to be 10% and 7% respectively. Which of the following techniques was used by the internal auditor In this calculation?
Horizontal analysis
Vertical analysis
Ratio analysis
Trend analysis
Vertical analysis expresses each financial statement item as a percentage of a base figure (e.g., revenue). In this case, the internal auditor calculates electricity and depreciation expenses as a percentage of revenue, which is a clear application of vertical analysis.
(A) Horizontal analysis:
Compares financial data across different periods to identify trends and growth.
The given scenario does not compare financial statements over time, making this incorrect.
(B) Vertical analysis (Correct Answer):
Expresses each line item as a percentage of a base figure (e.g., revenue for income statements, total assets for balance sheets).
In this case, electricity and depreciation expenses are calculated as a percentage of revenue, confirming vertical analysis.
(C) Ratio analysis:
Involves calculating financial ratios (e.g., profitability, liquidity, efficiency).
This scenario does not involve ratios but rather percentage-based comparisons, making it incorrect.
(D) Trend analysis:
Identifies patterns over multiple periods (e.g., revenue growth over five years).
The question does not involve time-based comparisons, so this answer is incorrect.
IIA Practice Guide: Internal Audit and Financial Reporting – Recommends vertical analysis for financial statement assessment.
IIA Standard 2320 – Analysis and Evaluation – Requires auditors to apply relevant analytical techniques, including percentage-based evaluations.
COSO Internal Control Framework – Financial Reporting Component – Supports financial data analysis techniques such as vertical and horizontal analysis.
Analysis of Each Option:IIA References:Conclusion:Since the auditor expressed financial statement items as a percentage of revenue, option (B) is the correct answer.
Which of the following statements about assurance maps is true?
They help identify gaps and duplications in an organization’s assurance coverage
They allow the board to coordinate activities of internal and external assurance providers
They help identify which assurance provider is responsible for performing each audit listed in the annual internal audit plan
They allow internal auditors to map competencies and specialty areas of the assurance providers in an organization
An assurance map provides an overview of assurance activities across the organization and helps identify gaps (uncovered risks) and duplications (overlap of work). This enhances coordination among assurance providers and supports the board’s governance oversight.
Option B is incorrect because the board does not coordinate activities; internal audit facilitates assurance mapping. Option C misinterprets the tool—it does not assign specific audits. Option D refers to staff competencies, not assurance coverage.
An organization has 10,000 units of a defect item in stock, per unit, market price is $10$; production cost is $4; and defect selling price is $5. What is the carrying amount (inventory value) of defects at your end?
$0
$4,000
$5,000
$10,000
The carrying amount (inventory value) of defective items is calculated based on the lower of cost or net realizable value (NRV) principle under Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS).
Given data:
Market price (normal selling price): $10 per unit
Production cost: $4 per unit
Defect selling price (NRV): $5 per unit
Total defective units: 10,000
Step 1: Determine the valuation rule
According to IAS 2 (Inventories), inventory should be valued at the lower of cost or net realizable value (NRV):
Cost per unit = $4
NRV per unit = $5
Since $4 (cost) < $5 (NRV), the cost per unit ($4) is used for valuation.
Step 2: Calculate total carrying amount
10,000 units×4 (cost per unit)=40,00010,000 \text{ units} \times 4 \text{ (cost per unit)} = 40,00010,000 units×4 (cost per unit)=40,000
However, since the items are defective, their value is determined by NRV ($5 per unit) because they cannot be sold at full market price.
10,000×5=50,00010,000 \times 5 = 50,00010,000×5=50,000
Since inventory should be recorded at the lower of cost or NRV, the inventory value is $5 per unit instead of $4.
10,000×5=5,00010,000 \times 5 = 5,00010,000×5=5,000
Thus, the verified answer is C. $5,000.
When auditing the account receivables for the first time, an internal auditor noted that the finance team had not—over many accounting periods—reviewed the accounts receivables for debts that could no longer be collected. How should the auditor proceed?
Escalate the finding to the board, due to the significance of the risk
Recommend that management review the receivables for debts that can no longer be collected and remove them from the cash flow statement
Recommend that management review the receivables for debts that can no longer be collected and write them off
Document the finding and conclude that no immediate action is warranted, as bad debt allowances are merely estimates
Best practice and accounting standards require that receivables unlikely to be collected be written off to avoid overstating assets. Internal audit should recommend that management review the receivables and write off uncollectible debts accordingly.
Option A (escalation to the board) is premature; it should first be addressed with management. Option B (removing from cash flow statement) is not correct because write-offs affect the balance sheet and income statement, not just cash flows. Option D ignores a material risk of misstated financial statements.
Which of the following is most appropriately placed in the financing section of an organization's cash budget?
Collections from customers
Sale of securities.
Purchase of trucks.
Payment of debt, including interest
Understanding the Financing Section of a Cash Budget:
A cash budget is a financial plan that outlines expected cash inflows and outflows over a specific period.
The financing section records activities related to borrowing, repaying debt, issuing securities, and managing interest payments.
Why Debt and Interest Payments Belong in the Financing Section:
Debt repayment (principal and interest) is a financial activity rather than an operational or investing activity.
Companies must plan for financing costs to ensure liquidity and compliance with loan agreements.
Why Other Options Are Incorrect:
A. Collections from customers – Incorrect.
Customer payments belong in the operating section of the cash budget, as they represent core business activities.
B. Sale of securities – Incorrect.
The sale of securities is an investing activity unless related to issuing new debt or equity.
C. Purchase of trucks – Incorrect.
Buying trucks is a capital expenditure, which belongs in the investing section of the cash budget.
IIA’s Perspective on Financial Planning and Budgeting:
IIA Standard 2120 – Risk Management requires organizations to assess financial risks, including debt repayment obligations.
COSO ERM Framework highlights the importance of cash flow forecasting to maintain financial stability.
GAAP and IFRS Financial Reporting Standards classify debt repayment and interest under financing activities.
IIA References:
IIA Standard 2120 – Risk Management & Cash Flow Oversight
COSO ERM – Financial Planning and Liquidity Management
GAAP & IFRS – Cash Flow Statement Classifications
Thus, the correct and verified answer is D. Payment of debt, including interest.
Which of the following can be classified as debt investments?
Investments in the capital stock of a corporation
Acquisition of government bonds.
Contents of an investment portfolio,
Acquisition of common stock of a corporation
Debt investments refer to financial instruments where an investor lends money to an entity (corporation, government, or institution) in exchange for periodic interest payments and the repayment of the principal amount at maturity. These include:
Government bonds (such as U.S. Treasury bonds, municipal bonds, and sovereign bonds)
Corporate bonds
Certificates of deposit (CDs)
Commercial paper
A. Investments in the capital stock of a corporation → Incorrect. Capital stock represents ownership (equity investments), not debt investments.
C. Contents of an investment portfolio → Incorrect. A portfolio may contain both equity and debt investments, making this too broad to classify specifically as debt.
D. Acquisition of common stock of a corporation → Incorrect. Common stock is an equity investment, not a debt investment.
The IIA’s Global Internal Audit Standards on Investment Management and Risk Assessment highlight debt instruments as fixed-income securities.
International Financial Reporting Standards (IFRS 9 – Financial Instruments) classify bonds and loans as debt investments, distinct from equity instruments.
The Generally Accepted Accounting Principles (GAAP) – FASB ASC 320 specifies how to account for debt securities.
Explanation of the Other Options:IIA References & Best Practices:Thus, the correct answer is B. Acquisition of government bonds.
An organization produces products X and Y. The materials used for the production of both products are limited to 500 Kilograms

(kg ) per month. All other resources are unlimited and their costs are fixed. Individual product details are as follows in order to maximize profit, how much of product Y should the organization produce each month?
$10 $13
2 kg
70 units
6 kg
120 units
50 units
60 units
70 units
1:20 units
To maximize profit with a limited material supply of 500 kg per month, the company should prioritize producing the product that generates the highest contribution margin per kg of material used.
Step 1: Calculate Contribution Margin Per Unit for Each ProductSince fixed costs are not relevant in this decision, we focus on the contribution margin per unit of raw material:
Selling price per unit = $10
Material cost per unit = 2 kg × $1/kg = $2
Contribution margin per unit = $10 - $2 = $8
Contribution margin per kg = $8 ÷ 2 kg = $4 per kg
Selling price per unit = $13
Material cost per unit = 6 kg × $1/kg = $6
Contribution margin per unit = $13 - $6 = $7
Contribution margin per kg = $7 ÷ 6 kg = $1.17 per kg
Product X ($4 per kg) is more profitable per kg than Product Y ($1.17 per kg).
To maximize profit, produce as many units of Product X as possible first, then allocate the remaining material to Product Y.
First, maximize production of Product X
Each unit of Product X requires 2 kg.
Maximum units of Product X = 500 kg ÷ 2 kg per unit = 250 units.
However, demand is only 70 units, so produce 70 units of Product X.
Material used for 70 units of X = 70 × 2 kg = 140 kg.
Material remaining = 500 kg - 140 kg = 360 kg.
Use remaining material for Product Y
Each unit of Product Y requires 6 kg.
Maximum units of Product Y = 360 kg ÷ 6 kg per unit = 60 units.
Produce 70 units of Product X (to meet demand).
Produce 60 units of Product Y (using the remaining material).
IIA GTAG 13: Business Performance Management – Discusses maximizing profit by prioritizing high contribution margin products.
IIA Practice Guide: Cost Analysis for Decision-Making – Covers constraints and resource allocation for maximizing profitability.
Product XProduct YStep 2: Prioritize Product with Higher Contribution Margin Per KgStep 3: Allocate Limited Material (500 kg)Final Decision:IIA References for Validation:Thus, B (60 units) is the correct answer because it optimally allocates the 500 kg of material to maximize profit.
Which statement is true regarding the development of a risk-based internal audit plan?
It requires a previously conducted assurance engagement on the organization’s risk management maturity
It requires an assessment by the internal audit function of key risks identified within the organization's risk management system
It requires that at least 90% of planned engagements address areas critical to the organization's strategy
It requires that an organization adheres to a well-recognized risk management framework in order to identify and manage its risks
A risk-based audit plan must be aligned with the organization’s objectives and risk management system. According to the Standards, the CAE must consider the organization’s risk management framework and assess key risks to develop the plan. A maturity review (Option A) is not a prerequisite, nor is a mandated percentage of strategic coverage (Option C). Option D is incorrect because an organization does not need to follow a specific external framework to develop a risk-based plan; internal risk identification suffices.
Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Rooting.
Eavesdropping.
Man in the middle.
Session hijacking.
Definition of Rooting:
Rooting (on Android) or Jailbreaking (on iOS) is the process of bypassing manufacturer and administrative security controls on a smart device.
This allows users to gain full control (root access) over the operating system, which can override security restrictions and allow installation of unauthorized applications.
How Rooting Increases Data Security Risks:
Bypassing Security Measures: Rooting removes built-in security protections, making the device more vulnerable to malware, unauthorized access, and data breaches.
Exposure to Malicious Apps: Rooted devices can install third-party applications that are not vetted by official app stores, increasing the risk of data theft, spyware, and ransomware attacks.
Circumventing Enterprise Security Policies: Many organizations use Mobile Device Management (MDM) to enforce security policies, but rooted devices can bypass these controls, exposing corporate data to cyber threats.
Increased Risk of Privilege Escalation Attacks: Attackers can exploit root access to take full control of the device, leading to unauthorized access to sensitive information.
IIA’s Perspective on Cybersecurity Risks:
IIA Standard 2110 – Governance emphasizes the importance of protecting sensitive data and ensuring compliance with IT security policies.
IIA’s GTAG (Global Technology Audit Guide) on Information Security warns against the dangers of rooted or jailbroken devices, as they compromise cybersecurity defenses.
NIST Cybersecurity Framework and ISO 27001 Information Security Standards identify unauthorized modifications to devices as a critical security risk.
Eliminating Incorrect Options:
B. Eavesdropping: This refers to intercepting communications (e.g., listening in on phone calls or network traffic) but does not involve circumventing administrative restrictions.
C. Man-in-the-Middle (MITM) Attack: This is an attack where an attacker intercepts and alters communication between two parties but does not involve rooting a device.
D. Session Hijacking: This attack involves stealing session tokens to impersonate a user but is unrelated to bypassing security controls on devices.
IIA References:
IIA Standard 2110 – Governance and IT Security
IIA GTAG – Information Security Risks
NIST Cybersecurity Framework
ISO 27001 Information Security Standards
A company produces water buckets with the following costs per bucket:
Direct labor = 82
Direct material = $5
Fixed manufacturing = 83.50
Variable manufacturing = 82.50
The water buckets are usually sold for $15. However, the company received a special order for 50.000 water buckets at 311 each.
Assuming there is adequate manufacturing capacity and ail other variables are constant , what is the relevant cost per unit to consider when deciding whether to accept this special order at the reduced price?
$9.50
$10.50
$11
$13
When evaluating a special order, only relevant costs should be considered. Fixed costs are not relevant because they remain unchanged regardless of production levels. The relevant costs include variable manufacturing costs and direct costs (direct labor and direct material).
Step-by-Step Calculation of Relevant Cost per Unit:Given cost per bucket:
Direct Labor = $2
Direct Material = $5
Variable Manufacturing Cost = $2.50
Fixed Manufacturing Cost = $3.50 (Not relevant)
Relevant Cost Per Unit:Direct Labor+Direct Material+Variable Manufacturing Cost\text{Direct Labor} + \text{Direct Material} + \text{Variable Manufacturing Cost}Direct Labor+Direct Material+Variable Manufacturing Cost =2+5+2.50=9.50= 2 + 5 + 2.50 = 9.50=2+5+2.50=9.50
Since fixed costs remain constant, they do not impact the decision to accept the order. The relevant cost is $9.50 per unit.
B. $10.50 – Includes some portion of fixed costs, which should be excluded.
C. $11 – Incorrect because it overestimates costs by considering fixed expenses.
D. $13 – Includes both fixed and variable costs, but only variable costs matter for decision-making.
IIA’s GTAG on Cost Analysis and Decision-Making – Emphasizes using relevant costs for pricing decisions.
COBIT 2019 (Governance and Decision-Making Framework) – Recommends marginal cost analysis for special orders.
Managerial Accounting Principles – States that fixed costs should not influence short-term pricing decisions.
Why Not the Other Options?IIA References:
What is the first step an internal audit function should take to define its organizational structure, deliverables, communication protocols, and resourcing model?
Recommend improvements to the organization’s governance policies, processes, and structures
Define a hiring plan to address competency gaps needed to execute the audit plan
Construct periodic self-assessments, ongoing monitoring, and external assessments to measure quality
Assess the needs and expectations of the board, senior management, and external auditors
The first step in defining the internal audit function’s structure and processes is to understand the needs and expectations of the board, senior management, and external stakeholders. This ensures alignment with organizational priorities and risk appetite.
Option A (recommend improvements) is a later activity. Option B (hiring plan) comes after the structure and resourcing needs are identified. Option C (quality assessments) occurs after processes are established.
Which of the following practices impacts copyright issues related to the manufacturer of a smart device?
Session hijacking.
Jailbreaking
Eavesdropping,
Authentication.
Understanding Copyright Issues and Smart Devices:
Copyright laws protect software, firmware, and intellectual property embedded in smart devices.
Jailbreaking refers to modifying a device’s software to remove manufacturer-imposed restrictions, often to install unauthorized third-party apps.
This violates software licensing agreements and may infringe on copyright protections under laws like the Digital Millennium Copyright Act (DMCA).
Why Option B (Jailbreaking) Is Correct?
Jailbreaking allows users to bypass manufacturer restrictions, potentially leading to unauthorized software distribution and copyright violations.
Manufacturers implement Digital Rights Management (DRM) to protect copyrighted firmware and software, which jailbreaking circumvents.
IIA Standard 2110 – Governance includes evaluating intellectual property risks and compliance in IT audits.
Why Other Options Are Incorrect?
Option A (Session hijacking):
This is a cybersecurity attack where a hacker takes control of a user session. It does not impact copyright laws.
Option C (Eavesdropping):
Eavesdropping refers to unauthorized network surveillance, which is a privacy issue, not a copyright issue.
Option D (Authentication):
Authentication is a security mechanism to verify user identity and has no direct relation to copyright concerns.
Jailbreaking bypasses copyright protections and violates software licensing agreements, making it the best answer.
IIA Standard 2110 emphasizes the importance of IT governance and compliance with intellectual property laws.
Final Justification:IIA References:
IPPF Standard 2110 – Governance (Intellectual Property & IT Compliance)
ISO 27001 – IT Security & Digital Rights Protection
Digital Millennium Copyright Act (DMCA) – Copyright Protection for Software
Which of the following is a security feature that involves the use of hardware and software to filter or prevent specific information from moving between the inside network and the outside network?
Authorization
Architecture model
Firewall
Virtual private network
In an effort to increase business efficiencies and improve customer service offered to its major trading partners, management of a manufacturing and distribution company established a secure network, which provides a secure channel for electronic data interchange between the company and its partners. Which of the following network types is illustrated by this scenario?
A value-added network.
A local area network.
A metropolitan area network.
A wide area network.
A Value-Added Network (VAN) is a private, third-party managed network that provides secure electronic data interchange (EDI) and other communication services between business partners. VANs offer enhanced security, reliability, and efficiency in transmitting business-critical data, making them ideal for companies engaged in manufacturing and distribution that require secure and structured communication channels with trading partners.
Secure Network for Business Partners: The scenario describes a network that facilitates EDI between a company and its trading partners. A VAN specializes in providing secure and structured business communications.
Enhanced Efficiency and Customer Service: VANs streamline business operations by reducing transaction errors, improving order fulfillment, and increasing operational efficiencies.
Third-Party Management: Unlike traditional internal networks, VANs are managed by external service providers that offer additional security, compliance, and encryption measures.
Alignment with Internal Auditing Standards: The IIA emphasizes the importance of secure and reliable communication networks in governance, risk management, and internal controls. Secure data exchanges through a VAN mitigate risks associated with unauthorized access and data breaches.
B. A Local Area Network (LAN): LANs are confined to a limited geographical area, such as an office or a factory, and are used for internal communication rather than secure external partner communication.
C. A Metropolitan Area Network (MAN): MANs connect multiple LANs within a city or a metropolitan region but are not specifically designed for business-to-business data exchange.
D. A Wide Area Network (WAN): While WANs connect geographically dispersed networks, they do not inherently provide the secure, structured EDI services that a VAN does.
IIA Standard 2110 - Governance: Emphasizes the importance of IT governance and secure communication channels in protecting business data.
IIA Standard 2120 - Risk Management: Highlights the need for secure data transmission to mitigate cyber risks.
IIA Standard 2201 - Planning the Engagement: Requires auditors to assess IT infrastructure, including networks used for business operations.
COBIT Framework (Control Objectives for Information and Related Technologies): Supports the use of secure, managed networks like VANs for business data exchange.
Key Reasons Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. A Value-Added Network (VAN).
Which of the following is an example of a physical control?
Providing fire detection and suppression equipment
Establishing a physical security policy and promoting it throughout the organization
Performing business continuity and disaster recovery planning
Keeping an offsite backup of the organization’s critical data
Which of the following statements is true regarding an investee that received a dividend distribution from an entity and is presumed to have little influence over the entity?
The cash dividends received increase the investee investment account accordingly.
The investee must adjust the investment account by the ownership interest
The investment account is adjusted downward by the percentage of ownership.
The investee must record the cash dividends as dividend revenue
Accounting Treatment for Investments with Little Influence:
When an investee has little or no influence over an entity, it uses the cost method (or fair value method, if applicable) to account for the investment.
Under the cost method, cash dividends received are recorded as dividend revenue rather than adjusting the investment account.
IIA Standard 2120 - Risk Management:
Internal auditors must ensure that financial reporting aligns with applicable accounting standards.
Applicable Accounting Standards:
IFRS 9 (Financial Instruments) and U.S. GAAP (ASC 320 - Investments in Equity Securities) state that dividends received should be recognized as income in the period received.
A. The cash dividends received increase the investee investment account accordingly. (Incorrect)
This applies to the equity method, used when an entity has significant influence (usually 20-50% ownership).
Under the cost method, dividend income is recognized as revenue, not as an increase in the investment account.
B. The investee must adjust the investment account by the ownership interest. (Incorrect)
Adjusting the investment account for ownership percentage is a feature of the equity method, not the cost method.
C. The investment account is adjusted downward by the percentage of ownership. (Incorrect)
A downward adjustment only occurs under the equity method when dividends exceed earnings, indicating a return of capital.
Under the cost method, dividends are recorded as revenue.
Explanation of Answer Choice D (Correct Answer):Explanation of Incorrect Answers:Conclusion:When an investee has little influence, dividends are recorded as revenue (Option D), following IFRS 9 and U.S. GAAP standards.
IIA References:
IIA Standard 2120 - Risk Management
IFRS 9 - Financial Instruments
U.S. GAAP ASC 320 - Investments in Equity Securities
Which of the following would most likely serve as a foundation for individual operational goats?
Individual skills and capabilities.
Alignment with organizational strategy.
Financial and human resources of the unit.
Targets of key performance indicators
Individual operational goals must align with an organization's overall strategy to ensure that employee efforts contribute to corporate success. Operational goals are specific, measurable objectives that support the broader strategic direction.
Why Option B (Alignment with organizational strategy) is Correct:
Organizational strategy defines the long-term vision, mission, and objectives.
Individual operational goals should align with this strategy to ensure consistency and effectiveness.
Strategic alignment ensures resources are used efficiently and performance contributes to corporate success.
Why Other Options Are Incorrect:
Option A (Individual skills and capabilities):
While important, skills alone do not define operational goals—they are tools to achieve goals.
Option C (Financial and human resources of the unit):
These resources support operational goals, but they do not serve as the foundation. Goals are set based on strategy first.
Option D (Targets of key performance indicators - KPIs):
KPIs measure performance but are not the basis for setting operational goals. Goals should align with strategy first, then KPIs track progress.
IIA Practice Guide – "Performance Management Auditing": Highlights strategic alignment as a basis for setting operational goals.
COSO ERM Framework – "Strategic and Performance Integration": Emphasizes aligning individual goals with organizational strategy.
IIA's Global Perspectives & Insights – "Auditing Organizational Performance": Discusses the role of strategy in goal-setting.
IIA References:Thus, the correct answer is B. Alignment with organizational strategy.
According to IIA guidance on IT, which of the following plans would pair the identification of critical business processes with recovery time objectives?
The business continuity management charter
The business continuity risk assessment plan
The business impact analysis plan
The business case for business continuity planning
Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?
The risk that users try to bypass controls and do not install required software updates
The risk that smart devices can be lost or stolen due to their mobile nature
The risk that an organization intrusively monitors personal information stored on smart devices
The risk that proprietary information is not deleted from the device when an employee leaves
Which of the following is on example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?
Anti-malware software
Authentication
Spyware
Rooting
Authentication is a key security control that prevents unauthorized users from accessing a smart device’s data or applications. It ensures that only authorized individuals can use the device, reducing risks such as data breaches, identity theft, and cyberattacks.
(A) Anti-malware software.
Incorrect. Anti-malware software protects against malicious programs, but it does not control user access to a device.
(B) Authentication. ✅
Correct. Authentication mechanisms (such as passwords, biometrics, PINs, and two-factor authentication) prevent unauthorized access to a device’s data and applications.
IIA GTAG "Managing and Auditing IT Vulnerabilities" highlights authentication as a primary control for protecting smart devices.
(C) Spyware.
Incorrect. Spyware is a security threat, not a preventive control. It is a type of malicious software that steals data from a device.
(D) Rooting.
Incorrect. Rooting (on Android) or jailbreaking (on iOS) refers to modifying a device to remove security restrictions, which increases security risks rather than preventing unauthorized access.
IIA GTAG – "Managing and Auditing IT Vulnerabilities"
IIA Standard 2120 – Risk Management
NIST Cybersecurity Framework – Identity and Access Management
Analysis of Answer Choices:IIA References:Thus, the correct answer is B, as authentication is the most effective security control for preventing unauthorized access to smart devices.
An internal auditor reviewed Finance Department records to obtain a list of current vendor addresses. The auditor then compared the vendor addresses to a record of employee addresses maintained by the Payroll Department Which of the following types of data analysis did the auditor perform?
Duplicate testing.
Joining data sources.
Gap analysis.
Classification
The internal auditor compared vendor addresses (Finance Department records) with employee addresses (Payroll Department records). This process is an example of "Joining Data Sources", which involves merging different datasets to identify relationships, discrepancies, or anomalies.
Definition of Joining Data Sources:
This technique is used in data analytics when an auditor merges two or more datasets based on a common field (e.g., addresses in this case).
It helps identify potential conflicts of interest or fraudulent transactions, such as employees creating fake vendors to receive unauthorized payments.
Application in Auditing:
The auditor is cross-referencing records from two different departments to check for potential fraud, duplicate payments, or unauthorized vendor relationships.
If vendor addresses match employee addresses, it could indicate a fraud risk (e.g., an employee making payments to a shell company they control).
A. Duplicate Testing: ❌
Involves identifying duplicate records within a single dataset, such as repeated invoice numbers or duplicate payments to the same vendor.
Here, the auditor is comparing two datasets, not searching for duplicates in one dataset.
C. Gap Analysis: ❌
Identifies missing data or discrepancies between expected and actual records (e.g., missing vendor payments).
In this case, the auditor is not looking for missing data but rather comparing records.
D. Classification: ❌
Involves categorizing data into predefined groups (e.g., classifying vendors as high-risk or low-risk).
The auditor is not categorizing vendors but matching addresses across datasets.
IIA GTAG (Global Technology Audit Guide) – Data Analytics for Internal Auditors: Discusses joining data sources to detect fraud, errors, and conflicts of interest.
IIA Standard 1220 (Due Professional Care): Requires auditors to apply appropriate data analysis techniques to assess risks effectively.
ACFE (Association of Certified Fraud Examiners) – Fraud Detection Techniques: Recommends cross-referencing employee and vendor records to detect fraud schemes.
Step-by-Step Justification:Why Not the Other Options?IIA References:Thus, the correct answer is B. Joining data sources. ✅
Senior management of a dairy organization asks the internal audit function to undertake an advisory service within the finance function and the internal audit function subsequently issues a report. Which of the following is aligned with IIA guidance on monitoring the results of such an engagement?
Senior management should dedicate a team to carry out a follow-up audit
A member of the finance function should undertake follow-up in line with the scope
Follow-up on the outcome of advisory services is not required
The internal audit function should agree with senior management on the scope of a follow-up
According to the IIA Standards, follow-up is mandatory only for assurance engagements, where corrective action plans are agreed and tracked. Advisory services are intended to add value and offer recommendations but do not require formal follow-up by internal audit. Responsibility for implementing recommendations lies with management.
Options A and B improperly delegate follow-up responsibilities, and Option D incorrectly suggests mandatory follow-up for advisory engagements.
Which of the following is most appropriate for the chief audit executive to keep in mind when establishing policies and procedures to guide the internal audit function?
The nature of the internal audit function
The size of the organization
The size and maturity of the internal audit function
The structure of the organization
Policies and procedures should be tailored to the size and maturity of the internal audit function. A small or less mature function may require simpler procedures, while a large and well-established function may require more detailed and formalized guidance.
Option A (nature of audit) and D (organizational structure) are relevant but secondary. Option B (organization size) does not necessarily dictate internal audit’s needs as directly as its own size and maturity.
According to IIA guidance, which of the following would be the best first step to manage risk when a third party is overseeing the organization’s network and data?
Creating a comprehensive reporting system for vendors to demonstrate their ongoing due diligence in network operations
Drafting a strong contract that requires regular vendor control reports and a right-to-audit clause
Applying administrative privileges to ensure right-to-access controls are appropriate
Creating a standing cybersecurity committee to identify and manage risks related to data security
The chief audit executive hired a consultant to update the internal audit function’s methodologies. Which of the following would best ensure that the internal audit function will adhere to the updated methodologies?
Placing the updated methodologies in an easily accessible location for reference
Requiring a signed acknowledgment that each auditor will comply with the updated methodologies
Preparing a recorded training that reviews the updated methodologies
Sharing a one-page summary of the updated methodologies during an internal audit function meeting
The most effective way to ensure adherence to updated methodologies is through training that reviews and explains the changes in detail. A recorded training session allows all auditors to learn consistently and revisit the content as needed.
Option A improves accessibility but does not ensure understanding or compliance. Option B documents acknowledgment but does not ensure comprehension. Option D provides awareness but lacks sufficient depth.
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?
Inventory of information assets
Limited sharing of data files with external parties.
Vulnerability assessment
Clearly defined policies
Strong Security Governance Requires Well-Defined Policies:
Cybersecurity governance is built upon clear, documented, and enforceable security policies that outline expectations, roles, responsibilities, and processes.
Policies define acceptable behaviors, security controls, incident response, and compliance requirements.
IIA Standard 2110 - Governance: Requires organizations to establish effective IT security governance, including policies that address cybersecurity risks.
IIA GTAG (Global Technology Audit Guide) on Information Security Governance:
Recommends that clear policies should guide security controls, user access, and incident response to address cybersecurity threats.
A. Inventory of information assets (Incorrect)
While identifying critical information assets is essential for risk management, it does not constitute security governance on its own.
Asset inventories support governance but must be reinforced by policies that define how data should be protected.
B. Limited sharing of data files with external parties (Incorrect)
Restricting data sharing is a control measure, not a governance principle.
Policies define when, how, and under what conditions data can be shared securely.
C. Vulnerability assessment (Incorrect)
Assessments help identify security gaps but do not establish governance.
Effective governance ensures that vulnerabilities are identified, prioritized, and remediated in accordance with policies.
Explanation of Answer Choice D (Correct Answer):Explanation of Incorrect Answers:Conclusion:To ensure strong security governance, organizations must have clearly defined security policies (Option D) as a foundation for managing cybersecurity threats.
IIA References:
IIA Standard 2110 - Governance
IIA GTAG - Information Security Governance
An organization upgraded to a new accounting software. Which of the following activities should be performed by the IT software vendor immediately following the upgrade?
Market analysis lo identify trends
Services to manage and maintain the IT Infrastructure.
Backup and restoration.
Software testing and validation
After upgrading to a new accounting software, it is critical to ensure that the system is functioning correctly and meets the organization's operational, compliance, and security requirements. The immediate priority should be software testing and validation to confirm that:
The upgrade was successfully implemented.
The system is free from major bugs or functionality errors.
Financial data integrity is maintained.
Compliance with accounting and regulatory standards is ensured.
(A) Market analysis to identify trends:
This is unrelated to post-upgrade activities. Market analysis is a strategic function typically handled by business intelligence or marketing teams, not IT software vendors.
(B) Services to manage and maintain the IT infrastructure:
While IT infrastructure maintenance is important, it is typically an ongoing operational task rather than an immediate post-upgrade activity.
(C) Backup and restoration:
While data backup should be completed before the software upgrade, restoration would only be necessary if the upgrade fails. However, this is a contingency plan, not a standard immediate post-upgrade activity.
(D) Software testing and validation (Correct Answer):
Immediately after an upgrade, software testing is critical to ensure that financial transactions, reporting, and other accounting functions operate correctly.
This includes user acceptance testing (UAT), integration testing, and validation against financial reporting requirements.
IIA Global Technology Audit Guide (GTAG) 8: Auditing Application Controls – Emphasizes the importance of testing and validating application functionality after implementation or upgrades.
IIA Standard 2110 - Governance – Requires internal auditors to assess whether IT governance supports the organization's strategic objectives, including testing new software for operational effectiveness.
COBIT (Control Objectives for Information and Related Technologies) Framework – Highlights the importance of post-implementation review to confirm that IT systems perform as expected.
Analysis of Each Option:IIA References:Conclusion:To ensure that the accounting software upgrade is successful and operationally sound, software testing and validation must be performed immediately. Therefore, option (D) is the correct answer.
While performing an audit of a car tire manufacturing plant, an internal auditor noticed a significant decrease in the number of tires produced from the previous operating
period. To determine whether worker inefficiency caused the decrease, what additional information should the auditor request?
Total tire production labor hours for the operating period.
Total tire production costs for the operating period.
Plant production employee headcount average for the operating period.
The production machinery utilization rates.
Understanding the Audit Concern:
The internal auditor observed a significant decline in tire production and needs to assess whether worker inefficiency is the cause.
Worker inefficiency is typically measured in terms of productivity, which relates output (number of tires produced) to input (labor hours worked).
Why Option A is Correct?
Total tire production labor hours provide a direct measure of worker efficiency. By analyzing the number of tires produced per labor hour, the auditor can determine whether efficiency has declined.
If labor hours remained constant or increased while production declined, this indicates inefficiency.
This approach aligns with IIA Standard 1220 – Due Professional Care, which requires auditors to use appropriate analysis to support findings.
Additionally, per IIA Standard 2310 – Identifying Information, auditors must obtain sufficient and relevant data to support conclusions.
Why Other Options Are Incorrect?
Option B (Total tire production costs):
Total costs include factors beyond labor efficiency, such as raw material prices, machinery maintenance, and overhead. This does not directly measure worker productivity.
Option C (Plant production employee headcount average):
Employee headcount alone does not reflect efficiency; it does not account for hours worked or individual performance.
Option D (Production machinery utilization rates):
Machinery efficiency is important but does not directly measure worker inefficiency. A decline in machine utilization could be due to maintenance, material shortages, or other non-labor factors.
Labor hours per unit of production (tires produced per labor hour) is the best metric for evaluating worker efficiency.
IIA Standards 1220 and 2310 support data-driven, relevant information gathering for audit conclusions.
Final Justification:IIA References:
IPPF Standard 1220 – Due Professional Care
IPPF Standard 2310 – Identifying Information
Performance Standard 2320 – Analysis and Evaluation
An employee was promoted within the organization and relocated to a new office in a different building. A few months later, security personnel discovered that the employee's smart card was being used to access the building where she previously worked. Which of the following security controls could prevent such an incident from occurring?
Regular review of logs.
Two-level authentication.
Photos on smart cards.
Restriction of access hours.
The scenario describes a security breach where an employee’s smart card access was not updated after relocation. The best way to prevent such incidents is to regularly review access logs to detect and revoke outdated permissions.
Timely Detection of Unauthorized Access:
Regular log reviews allow security teams to identify anomalies, such as an employee accessing a location where they no longer work.
Access Control Auditing:
Periodic reviews help update access rights, ensuring that only authorized personnel have access to specific areas.
Compliance with Security Standards:
IIA Standard 2110 - Governance emphasizes ensuring security measures are effective.
ISO 27001 - Access Control Policies recommends regular access reviews to prevent unauthorized access.
B. Two-level authentication:
While multi-factor authentication enhances security, it would not remove outdated access rights from the system.
C. Photos on smart cards:
A photo helps in identity verification, but it does not prevent unauthorized access if the card remains active.
D. Restriction of access hours:
Limiting access times would not stop an unauthorized user from entering during valid hours.
IIA Standard 2110 - Governance: Internal auditors must assess IT and physical security controls.
IIA Standard 2120 - Risk Management: Ensures risks associated with unauthorized access are managed.
COBIT Framework - Identity and Access Management: Recommends reviewing user access logs for anomalies.
Key Reasons Why Option A is Correct:Why Other Options Are Incorrect:IIA References:Thus, the correct answer is A. Regular review of logs.
At one organization, the specific terms of a contract require both the promisor and promisee to sign the contract in the presence of an independent witness. What is the primary role to the witness to these signatures?
A witness verifies the quantities of the copies signed.
A witness verifies that the contract was signed with the free consent of the promisor and promisee.
A witness ensures the completeness of the contract between the promisor and promisee.
A witness validates that the signatures on the contract were signed by the promisor and promisee.
In contract law, a witness's primary role is to confirm that the signatures on the contract were made by the actual parties (promisor and promisee) and that they signed it in the witness’s presence. This helps prevent disputes regarding forgery or coercion.
(A) A witness verifies the quantities of the copies signed.
Incorrect: The witness's role is not to verify how many copies were signed but rather to confirm authenticity.
(B) A witness verifies that the contract was signed with the free consent of the promisor and promisee.
Partially correct but not the primary role: The witness’s presence may discourage coercion, but their main function is not to confirm free consent (that is a legal principle covered by contract law and not necessarily the witness's duty).
(C) A witness ensures the completeness of the contract between the promisor and promisee.
Incorrect: The completeness of the contract is the responsibility of the parties involved, not the witness.
(D) A witness validates that the signatures on the contract were signed by the promisor and promisee. (Correct Answer)
This aligns with the legal definition of a witness in contract law: verifying the identity of signatories and ensuring that they physically signed the contract.
The witness does not interpret the contract's terms or validate its content, only the signatures.
IIA Standard 2410 – Criteria for Communicating: Requires auditors to confirm the authenticity and validity of documents.
IIA Standard 2330 – Documenting Information: Supports the principle of ensuring reliable and complete documentation.
Contract Law Principles: A witness’s role is to verify the signatories’ identities and confirm they signed the document in their presence.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (D) because a witness’s main duty is to validate that the contract was signed by the identified parties, ensuring authenticity and reducing legal disputes.
Copyright © 2014-2026 Examstrust. All Rights Reserved