IIA-CIA-Part1 無料問題集「IIA Essentials of Internal Auditing」

While performing an internal audit engagement, an auditor reviews a flowchart of the organization's purchasing function. Which of the following internal control weaknesses would the auditor be able to identify in the chart?

According to IIA guidance, which of the following activities would typically be examined when using the maturity model approach for assessing an organization's risk management program?

Which of the following statements is true regarding the importance of risk management?

Which of the following is true regarding a quality assurance and improvement program?

The primary reason that a chief audit executive (CAE) reviews external audit management letters and management response is to:

Noncompliance with which of the following would cause a control deficiency related to privacy protection practices?
I. An organization's internal privacy policies.
II. Financial accounting standards.
III. Privacy laws and regulations.
IV. The Standards.

Which of the following is an appropriate role for the internal audit activity?

IT management requires all employees in the IT department to attend annual training on the department's mission, values, and key performance measures. This activity is designed to prevent which of the following conditions?

Which of the following activities best reflects the scope and status of the internal audit activity as defined in the internal audit policy statement?

During a routine audit of a customer service hotline, an internal auditor noticed that an unusually high number of customer complaints pertained to payments not being applied to the customers' accounts. Which of the following would most likely be the reason for the high volume of complaints?

An auditor identifies three errors in the sample of 25 entries selected for review (a 12 percent error rate). Based on this result, the auditor assumes that approximately 59 of the total population of 492 entries are incorrect. To reach this assumption, the auditor has used a technique known as which of the following?

Which of the following would be most helpful to measure whether an internal audit activity successfully provides risk-based assurance?

A chief audit executive (CAE) has been asked by the board to evaluate the effectiveness of ethical programs created by management. Which of the following would be the most appropriate action for the CAE to take?

In preparing for an audit of the footwear division of a major retail organization, an internal auditor gathered the following information about the organization's stores:
In addition to labor costs, the other costs associated with each store are leasing and maintenance expenses. Which of the following is a valid conclusion?

Which of the following would provide the best evidence of errors in the quantities of items received from suppliers?

Which of the following tools would provide the most useful depiction of a process flow that spans multiple departments in an organization?

Management has requested that an internal auditor serve as member of a task force that will review current receivables practices and make recommendations to improve processes. Which of the following is the most appropriate response by the internal auditor?

Which of the following statements is not true about red flags?

In developing an appropriate work program for an audit engagement, the most important factor for an audit supervisor to consider is the:

To identify those components of a telecommunications system that present the greatest risk, an internal auditor should first:

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡