IIA IIA-CIA-Part3 Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: IIA-CIA-Part3
- Prüfungsname: CIA Exam Part Three: Business Knowledge for Internal Auditing
- Zertifizierungsanbieter: IIA
- Zuletzt aktualisiert am: 26.04.2025
For employees, the primary value of implementing job enrichment is which of the following?
- A . Validation of the achievement of their goals anti objectives
- B . Increased knowledge through the performance of additional tasks
- C . Support for personal growth and a meaningful work experience
- D . An increased opportunity to manage better the work done by their subordinates
Which of the following actions should an internal auditor take to clean the data obtained for analytics purposes?
- A . Deploys data visualization tool.
- B . Adopt standardized data analysis software.
- C . Define analytics objectives and establish outcomes.
- D . Eliminate duplicate records.
Which of the following parties is most likely to be responsible for maintaining the infrastructure required to prevent the failure of a real-time backup of a database?
- A . IT database administrator.
- B . IT data center manager.
- C . IT help desk function.
- D . IT network administrator.
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet. When the spreadsheet was opened, the cybercriminal was able to attack the company’s network and gain access to an unpublished and highly anticipated book.
Which of the following controls would be most effective to prevent such an attack?
- A . Monitoring network traffic.
- B . Using whitelists and blacklists to manage network traffic.
- C . Restricting access and blocking unauthorized access to the network
- D . Educating employees throughout the company to recognize phishing attacks.
Which of the following controls is the most effective for ensuring confidentially of transmitted information?
- A . Firewall.
- B . Antivirus software.
- C . Passwords.
- D . Encryption.
Which of the following risks would Involve individuals attacking an oil company’s IT system as a sign of solidarity against drilling in a local area?
- A . Tampering
- B . Hacking
- C . Phishing
- D . Piracy
Which of the following is an example of a physical control?
- A . Providing fire detection and suppression equipment
- B . Establishing a physical security policy and promoting it throughout the organization
- C . Performing business continuity and disaster recovery planning
- D . Keeping an offsite backup of the organization’s critical data
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
- A . An extranet
- B . A local area network
- C . An Intranet
- D . The internet
A restaurant decided to expand its business to include delivery services, rather than relying on third-party food delivery services.
Which of the following best describes the restaurants strategy?
- A . Diversification
- B . Vertical integration
- C . Risk avoidance
- D . Differentiation
Which of the following items represents the first thing that should be done with obtained dote in the data analytics process?
- A . Verify completeness and accuracy.
- B . Verify existence and accuracy.
- C . Verify completeness and integrity.
- D . Verify existence and completeness.